Directory traversal vulnerability in admin.php in CCleague Pro Sports CMS 1.0.1 RC1 allows remote attackers to read and execute arbitrary local files via a .. (dot dot) sequence and trailing null (%00) byte in the language Cookie parameter, as demonstrated by executing PHP code via a log file.
References
Configurations
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21843 - Exploit, Vendor Advisory | |
References | () http://sn4k3.persiangig.com/Expl0it/CCleaguePro_V1.0.1RC1%20Directory%20Traversal%20Vulnerability.txt - | |
References | () http://unkn0wn.awardspace.com/Blog/?p=46 - | |
References | () http://www.securityfocus.com/archive/1/463191/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/463217/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/3549 - | |
References | () https://www.exploit-db.com/exploits/2333 - |
Information
Published : 2006-09-12 16:07
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4721
Mitre link : CVE-2006-4721
CVE.ORG link : CVE-2006-4721
JSON object : View
Products Affected
ccleague
- pro_sports_cms
CWE