Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-0625

Опубликовано: 09 фев. 2006
Источник: debian
EPSS Низкий

Описание

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
spipfixed2.0.6-1package

Примечания

  • http://www.securityfocus.com/bid/16556

EPSS

Процентиль: 93%
0.09677
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

github
почти 4 года назад

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

EPSS

Процентиль: 93%
0.09677
Низкий