Vulnerability CVE-2006-1478


Published: 2006-03-28   Modified: 2012-02-12

Description:
Directory traversal vulnerability in (1) initiate.php and (2) possibly other PHP scripts in Turnkey Web Tools PHP Live Helper 1.8, and possibly later versions, allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the language cookie, as demonstrated by uploading PHP code in a gl_session cookie to users.php, which causes the code to be stored in error.log, which is then included by initiate.php.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
PHPLiveHelper 1.8 remote command execution (include) Xploit (perl)
rUnViRuS
28.03.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Turnkey web tools -> Php live helper 

 References:
http://securityreason.com/securityalert/641
http://www.securityfocus.com/archive/1/428976/100/0/threaded
http://www.turnkeywebtools.com/forum/showthread.php?p=10415
http://www.worlddefacers.de/Public/WD-TMPLH.txt
https://exchange.xforce.ibmcloud.com/vulnerabilities/25489

Copyright 2024, cxsecurity.com

 

Back to Top