Vulnerability CVE-2006-6254


Published: 2006-12-04   Modified: 2012-02-12

Description:
administration/telecharger.php in Cahier de texte 2.0 allows remote attackers to obtain unparsed content (source code) of files via the chemin parameter, as demonstrated using directory traversal sequences to obtain the MySQL username and password from conn_cahier_de_texte.php. NOTE: it is not clear whether the scope of this issue extends above the web document root, and whether directory traversal is the primary vulnerability.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Cahier de texte V2.0 SQL Code Execution Exploit
DarkFig
06.12.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Cahier de textes -> Cahier de textes 

 References:
http://acid-root.new.fr/poc/15061124.txt
http://securityreason.com/securityalert/1961
http://www.securityfocus.com/archive/1/452600/100/0/threaded
http://www.securityfocus.com/bid/21283
http://www.vupen.com/english/advisories/2006/4701

Copyright 2024, cxsecurity.com

 

Back to Top