Vulnerabilities > CVE-2006-0702 - Multiple vulnerability in Imagevue 0.16.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
imagevue
nessus
exploit available

Summary

admin/upload.php in imageVue 16.1 allows remote attackers to upload arbitrary files to certain allowed folders via .. (dot dot) sequences in the path parameter. NOTE: due to the lack of details, the specific vulnerability type cannot be determined, although it might be due to directory traversal.

Vulnerable Configurations

Part Description Count
Application
Imagevue
1

Exploit-Db

descriptionImageVue 0.16.1 upload.php Unrestricted File Upload. CVE-2006-0702. Webapps exploit for php platform
idEDB-ID:27200
last seen2016-02-03
modified2006-02-11
published2006-02-11
reporterzjieb
sourcehttps://www.exploit-db.com/download/27200/
titleImageVue 0.16.1 upload.php Unrestricted File Upload

Nessus

NASL familyCGI abuses
NASL idIMAGEVUE_162.NASL
descriptionThe remote host is running imageVue, a web-based photo gallery application written in PHP. The installed version of imageVue allows unauthenticated attackers to upload arbitrary files, including files containing code that can then be executed subject to the privileges of the web server user id. In addition, it is also reportedly affected by information disclosure and cross-site scripting vulnerabilities, although Nessus has not checked for those issues.
last seen2020-06-01
modified2020-06-02
plugin id20991
published2006-03-03
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20991
titleimageVue < 16.2 admin/upload.php Unrestricted File Upload