Описание
Directory traversal vulnerability in Quake 3 engine, as used in products including Quake3 Arena, Return to Castle Wolfenstein, Wolfenstein: Enemy Territory, and Star Trek Voyager: Elite Force, when the sv_allowdownload cvar is enabled, allows remote attackers to read arbitrary files from the server via ".." sequences in a .pk3 file request.
Directory traversal vulnerability in Quake 3 engine, as used in products including Quake3 Arena, Return to Castle Wolfenstein, Wolfenstein: Enemy Territory, and Star Trek Voyager: Elite Force, when the sv_allowdownload cvar is enabled, allows remote attackers to read arbitrary files from the server via ".." sequences in a .pk3 file request.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2082
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26347
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045906.html
- http://securityreason.com/securityalert/880
- http://www.securityfocus.com/archive/1/433349/100/0/threaded
- http://www.securityfocus.com/bid/17924
EPSS
CVE ID
Связанные уязвимости
Directory traversal vulnerability in Quake 3 engine, as used in products including Quake3 Arena, Return to Castle Wolfenstein, Wolfenstein: Enemy Territory, and Star Trek Voyager: Elite Force, when the sv_allowdownload cvar is enabled, allows remote attackers to read arbitrary files from the server via ".." sequences in a .pk3 file request.
Directory traversal vulnerability in Quake 3 engine, as used in produc ...
EPSS