Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21287 - Exploit, Vendor Advisory | |
References | () http://www.phpportals.com/forums/showthread.php?t=17308 - | |
References | () http://www.securityfocus.com/bid/19257 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/3102 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28077 - | |
References | () https://www.exploit-db.com/exploits/2087 - |
Information
Published : 2006-08-07 19:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-4004
Mitre link : CVE-2006-4004
CVE.ORG link : CVE-2006-4004
JSON object : View
Products Affected
vbportal
- vbportal
CWE