Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-0713

Опубликовано: 15 фев. 2006
Источник: nvd
CVSS2: 5
EPSS Средний

Описание

Directory traversal vulnerability in LinPHA 1.0 allows remote attackers to include arbitrary files via .. (dot dot) sequences in the (1) lang parameter in docs/index.php and the language parameter in (2) install/install.php, (3) install/sec_stage_install.php, (4) install/third_stage_install.php, and (5) install/forth_stage_install.php. NOTE: direct static code injection is resultant from this issue, as demonstrated by inserting PHP code into the username, which is inserted into linpha.log, which is accessible from the directory traversal.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:linpha:linpha:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:linpha:linpha:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:linpha:linpha:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:linpha:linpha:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:linpha:linpha:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:linpha:linpha:1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 94%
0.11979
Средний

5 Medium

CVSS2

Дефекты

NVD-CWE-Other

Связанные уязвимости

github
почти 4 года назад

Directory traversal vulnerability in LinPHA 1.0 allows remote attackers to include arbitrary files via .. (dot dot) sequences in the (1) lang parameter in docs/index.php and the language parameter in (2) install/install.php, (3) install/sec_stage_install.php, (4) install/third_stage_install.php, and (5) install/forth_stage_install.php. NOTE: direct static code injection is resultant from this issue, as demonstrated by inserting PHP code into the username, which is inserted into linpha.log, which is accessible from the directory traversal.

EPSS

Процентиль: 94%
0.11979
Средний

5 Medium

CVSS2

Дефекты

NVD-CWE-Other