Directory traversal vulnerability in upload/bin/download.php in Upload Tool for PHP 1.0 allows remote attackers to read arbitrary files via (1) ".." sequences or (2) absolute pathnames in the filename parameter.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22973 - | |
References | () http://www.craigheffner.com/security/exploits/upload_tool_php.txt - Exploit, URL Repurposed | |
References | () http://www.securityfocus.com/bid/21150 - | |
References | () http://www.vupen.com/english/advisories/2006/4575 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/30322 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.craigheffner.com/security/exploits/upload_tool_php.txt - Exploit, URL Repurposed |
Information
Published : 2007-03-06 01:19
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7133
Mitre link : CVE-2006-7133
CVE.ORG link : CVE-2006-7133
JSON object : View
Products Affected
php_upload_tool
- php_upload_tool
CWE