Directory traversal vulnerability in start.php in WebAlbum 2.02 allows remote attackers to include arbitrary files and execute commands by (1) injecting code into local log files via GET commands, then (2) accessing that log via a .. (dot dot) sequence and a trailing null (%00) byte in the skin2 COOKIE parameter.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19400 - Exploit, Vendor Advisory | |
References | () http://www.osvdb.org/24160 - | |
References | () http://www.securityfocus.com/bid/17228 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1108 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25443 - | |
References | () https://www.exploit-db.com/exploits/1608 - |
Information
Published : 2006-03-29 01:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1480
Mitre link : CVE-2006-1480
CVE.ORG link : CVE-2006-1480
JSON object : View
Products Affected
duda
- webalbum
CWE