Vulnerability CVE-2006-0756


Published: 2006-02-17   Modified: 2012-02-12

Description:
** DISPUTED ** dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php.

See advisories in our WLB2 database:
Topic
Author
Date
High
dotproject <= 2.0.1 remote code execution
Robin Verton
16.02.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Dotproject -> Dotproject 

 References:
http://securityreason.com/securityalert/434
http://www.securityfocus.com/archive/1/424957/100/0/threaded
http://www.securityfocus.com/archive/1/425285/100/0/threaded
http://www.securityfocus.com/bid/16648
http://www.vupen.com/english/advisories/2006/0604
https://exchange.xforce.ibmcloud.com/vulnerabilities/24745

Copyright 2024, cxsecurity.com

 

Back to Top