ID CVE-2006-4878
Summary Directory traversal vulnerability in footer.php in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to read and include arbitrary local files via a .. (dot dot) sequence in the template parameter. NOTE: this was later reported to affect 1.0.1, and demonstrated for code execution by uploading and accessing an avatar file.
References
Vulnerable Configurations
  • cpe:2.3:a:david_bennett:php-post:*:*:*:*:*:*:*:*
    cpe:2.3:a:david_bennett:php-post:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-10-2018 - 21:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid
  • 20061
  • 20616
bugtraq 20060916 PHP-Post Multiple Input Validation Vulnerabilities
exploit-db 2593
osvdb 28964
secunia 22014
sreason 1607
vupen ADV-2006-3688
xf phppost-template-code-execution(29673)
Last major update 17-10-2018 - 21:40
Published 19-09-2006 - 21:07
Last modified 17-10-2018 - 21:40
Back to Top