Описание
Directory traversal vulnerability in main.php in PCPIN Chat 5.0.4 and earlier allows remote authenticated users to include and execute arbitrary PHP code via a ".." (dot dot) in a language cookie, as demonstrated by uploading then accessing a smiliefile image that actually contains PHP code.
Directory traversal vulnerability in main.php in PCPIN Chat 5.0.4 and earlier allows remote authenticated users to include and execute arbitrary PHP code via a ".." (dot dot) in a language cookie, as demonstrated by uploading then accessing a smiliefile image that actually contains PHP code.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-1963
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25962
- http://retrogod.altervista.org/pcpin_504_xpl.html
- http://secunia.com/advisories/19708
- http://securitytracker.com/id?1015968
- http://www.securityfocus.com/archive/1/431390/100/0/threaded
- http://www.securityfocus.com/archive/1/436029/100/0/threaded
- http://www.securityfocus.com/bid/17632
- http://www.vupen.com/english/advisories/2006/1441
EPSS
CVE ID
Связанные уязвимости
Directory traversal vulnerability in main.php in PCPIN Chat 5.0.4 and earlier allows remote authenticated users to include and execute arbitrary PHP code via a ".." (dot dot) in a language cookie, as demonstrated by uploading then accessing a smiliefile image that actually contains PHP code.
EPSS