Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/21413 - | |
References | () http://www.vupen.com/english/advisories/2006/4836 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30700 - | |
References | () https://www.exploit-db.com/exploits/2888 - |
Information
Published : 2006-12-10 21:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6445
Mitre link : CVE-2006-6445
CVE.ORG link : CVE-2006-6445
JSON object : View
Products Affected
envolution
- envolution
CWE