Описание
Directory traversal vulnerability in randompic.php in pppBLOG 0.3.8 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an index of the "file" array parameter, as demonstrated by file[0].
Directory traversal vulnerability in randompic.php in pppBLOG 0.3.8 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an index of the "file" array parameter, as demonstrated by file[0].
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2770
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26969
- http://retrogod.altervista.org/pppblog_038_xpl.html
- http://secunia.com/advisories/20375
- http://securityreason.com/securityalert/1015
- http://securitytracker.com/id?1016198
- http://www.securityfocus.com/archive/1/435406/100/0/threaded
- http://www.securityfocus.com/bid/18189
- http://www.vupen.com/english/advisories/2006/2085
EPSS
CVE ID
Связанные уязвимости
Directory traversal vulnerability in randompic.php in pppBLOG 0.3.8 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an index of the "file" array parameter, as demonstrated by file[0].
EPSS