Vulnerabilities > CVE-2005-1884 - Directory Traversal vulnerability in Yapig 0.92B/0.93U/0.94U

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
yapig
nessus
exploit available

Summary

Directory traversal vulnerability in the (1) rmdir or (2) mkdir commands in upload.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to create or delete arbitrary directories via a .. (dot dot) in the dir parameter.

Vulnerable Configurations

Part Description Count
Application
Yapig
3

Exploit-Db

descriptionYaPiG 0.9x Upload.PHP Directory Traversal Vulnerability. CVE-2005-1884. Webapps exploit for php platform
idEDB-ID:25794
last seen2016-02-03
modified2005-06-06
published2005-06-06
reporteranonymous
sourcehttps://www.exploit-db.com/download/25794/
titleYaPiG 0.9x Upload.PHP Directory Traversal Vulnerability

Nessus

NASL familyCGI abuses
NASL idYAPIG_MULTIPLE_FLAWS.NASL
descriptionThe remote host is running YaPiG, a web-based image gallery written in PHP. The installed version of YaPiG is vulnerable to multiple flaws : - Remote and local file inclusion. - Cross-site scripting and HTML injection flaws through
last seen2020-06-01
modified2020-06-02
plugin id18523
published2005-06-17
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18523
titleYaPiG < 0.95b Multiple Vulnerabilities