CVE-2006-1480

Directory traversal vulnerability in start.php in WebAlbum 2.02 allows remote attackers to include arbitrary files and execute commands by (1) injecting code into local log files via GET commands, then (2) accessing that log via a .. (dot dot) sequence and a trailing null (%00) byte in the skin2 COOKIE parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:duda:webalbum:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:08

Type Values Removed Values Added
References () http://secunia.com/advisories/19400 - Exploit, Vendor Advisory () http://secunia.com/advisories/19400 - Exploit, Vendor Advisory
References () http://www.osvdb.org/24160 - () http://www.osvdb.org/24160 -
References () http://www.securityfocus.com/bid/17228 - Exploit () http://www.securityfocus.com/bid/17228 - Exploit
References () http://www.vupen.com/english/advisories/2006/1108 - () http://www.vupen.com/english/advisories/2006/1108 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25443 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25443 -
References () https://www.exploit-db.com/exploits/1608 - () https://www.exploit-db.com/exploits/1608 -

Information

Published : 2006-03-29 01:06

Updated : 2024-11-21 00:08


NVD link : CVE-2006-1480

Mitre link : CVE-2006-1480

CVE.ORG link : CVE-2006-1480


JSON object : View

Products Affected

duda

  • webalbum