CVE-2006-4140

Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*
cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://secunia.com/advisories/21468 - Exploit, Vendor Advisory () http://secunia.com/advisories/21468 - Exploit, Vendor Advisory
References () http://securityreason.com/securityalert/1389 - () http://securityreason.com/securityalert/1389 -
References () http://securitytracker.com/id?1016676 - Exploit () http://securitytracker.com/id?1016676 - Exploit
References () http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733 - () http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733 -
References () http://www.paessler.com/ipcheck/history - () http://www.paessler.com/ipcheck/history -
References () http://www.securityfocus.com/archive/1/442822/100/0/threaded - () http://www.securityfocus.com/archive/1/442822/100/0/threaded -
References () http://www.securityfocus.com/archive/1/444227/100/0/threaded - () http://www.securityfocus.com/archive/1/444227/100/0/threaded -
References () http://www.securityfocus.com/bid/19473 - Exploit () http://www.securityfocus.com/bid/19473 - Exploit
References () http://www.vupen.com/english/advisories/2006/3259 - () http://www.vupen.com/english/advisories/2006/3259 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28341 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28341 -

Information

Published : 2006-08-14 23:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4140

Mitre link : CVE-2006-4140

CVE.ORG link : CVE-2006-4140


JSON object : View

Products Affected

ipcheck

  • server_monitor