Vulnerability CVE-2006-0713


Published: 2006-02-15   Modified: 2012-02-12

Description:
Directory traversal vulnerability in LinPHA 1.0 allows remote attackers to include arbitrary files via .. (dot dot) sequences in the (1) lang parameter in docs/index.php and the language parameter in (2) install/install.php, (3) install/sec_stage_install.php, (4) install/third_stage_install.php, and (5) install/forth_stage_install.php. NOTE: direct static code injection is resultant from this issue, as demonstrated by inserting PHP code into the username, which is inserted into linpha.log, which is accessible from the directory traversal.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Linpha <= 1.0 multiple arbitrary local inclusion
rgod
15.02.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Linpha -> Linpha 

 References:
http://retrogod.altervista.org/linpha_10_local.html
http://securityreason.com/securityalert/426
http://www.securityfocus.com/archive/1/424729/100/0/threaded
http://www.securityfocus.com/bid/16592
http://www.vupen.com/english/advisories/2006/0535
https://exchange.xforce.ibmcloud.com/vulnerabilities/24663

Copyright 2024, cxsecurity.com

 

Back to Top