Directory traversal vulnerability in Nodez 4.6.1.1 and earlier allows remote attackers to read or include arbitrary PHP files via a .. (dot dot) in the op parameter, as demonstrated by inserting malicious Email parameters into list.gtdat, then accessing list.gtdat using the op parameter.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://hamid.ir/security/nodez.txt - Exploit | |
References | () http://secunia.com/advisories/19165 - Exploit, Vendor Advisory | |
References | () http://securitytracker.com/id?1015747 - | |
References | () http://www.osvdb.org/23774 - | |
References | () http://www.securityfocus.com/bid/17066 - | |
References | () http://www.vupen.com/english/advisories/2006/0899 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25119 - |
Information
Published : 2006-03-12 21:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1162
Mitre link : CVE-2006-1162
CVE.ORG link : CVE-2006-1162
JSON object : View
Products Affected
nodez
- nodez
CWE