PHP Advanced Transfer Manager 1.00 through 1.30 stores sensitive information, including password hashes, under the web root with insufficient access control, which allows remote attackers to download each password hash via a direct request for a users/[USERNAME] file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://biyosecurity.be/bugs/patm.txt - Exploit | |
References | () http://secunia.com/advisories/17134 - | |
References | () http://securityreason.com/securityalert/565 - | |
References | () http://www.blogcu.com/Liz0ziM/316652/ - Exploit, URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/427216/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/437513/100/200/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25127 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.blogcu.com/Liz0ziM/316652/ - Exploit, URL Repurposed |
Information
Published : 2006-03-14 01:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1209
Mitre link : CVE-2006-1209
CVE.ORG link : CVE-2006-1209
JSON object : View
Products Affected
bugada_andrea
- php_advanced_transfer_manager
CWE