Vulnerabilities > CVE-2006-0899 - Remote File Include vulnerability in 4images
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Directory traversal vulnerability in index.php in 4Images 1.7.1 and earlier allows remote attackers to read and include arbitrary files via ".." (dot dot) sequences in the template parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | 4Images <= 1.7.1 (Local Inclusion) Remote Code Execution Exploit. CVE-2006-0899. Webapps exploit for php platform |
file | exploits/php/webapps/1533.php |
id | EDB-ID:1533 |
last seen | 2016-01-31 |
modified | 2006-02-26 |
platform | php |
port | |
published | 2006-02-26 |
reporter | rgod |
source | https://www.exploit-db.com/download/1533/ |
title | 4Images <= 1.7.1 Local Inclusion Remote Code Execution Exploit |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | 4IMAGES_171_DIRECTORY_TRAVERSAL.NASL |
description | 4Images is installed on the remote system. It is an image gallery management system. The installed application does not validate user-input passed in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21020 |
published | 2006-03-06 |
reporter | This script is Copyright (C) 2006-2018 Ferdy Riphagen |
source | https://www.tenable.com/plugins/nessus/21020 |
title | 4Images <= 1.7.1 index.php template Parameter Traversal Local File Inclusion |
code |
|
References
- http://retrogod.altervista.org/4images_171_adv.html
- http://secunia.com/advisories/19026
- http://securityreason.com/securityalert/518
- http://www.osvdb.org/23529
- http://www.securityfocus.com/archive/1/426468/100/0/threaded
- http://www.securityfocus.com/bid/16855
- http://www.vupen.com/english/advisories/2006/0754
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24938
- https://www.exploit-db.com/exploits/1533