Описание
Directory traversal vulnerability in PHPKIT 1.6.1 R2 and earlier might allow remote authenticated users to execute arbitrary PHP code via a .. (dot dot) in the path parameter and a %00 at the end of the filename, as demonstrated by an avatar filename ending with .png%00.
Directory traversal vulnerability in PHPKIT 1.6.1 R2 and earlier might allow remote authenticated users to execute arbitrary PHP code via a .. (dot dot) in the path parameter and a %00 at the end of the filename, as demonstrated by an avatar filename ending with .png%00.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-4424
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23014
- http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00110.html
- http://secunia.com/advisories/17479
- http://securityreason.com/securityalert/157
- http://www.hardened-php.net/advisory_212005.80.html
- http://www.osvdb.org/20562
- http://www.securityfocus.com/bid/15354
EPSS
CVE ID
Связанные уязвимости
Directory traversal vulnerability in PHPKIT 1.6.1 R2 and earlier might allow remote authenticated users to execute arbitrary PHP code via a .. (dot dot) in the path parameter and a %00 at the end of the filename, as demonstrated by an avatar filename ending with .png%00.
EPSS