Vulnerabilities > CVE-2006-4878 - Unspecified vulnerability in David Bennett PHP-Post
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN david-bennett
exploit available
Summary
Directory traversal vulnerability in footer.php in David Bennett PHP-Post (PHPp) 1.0 and earlier allows remote attackers to read and include arbitrary local files via a .. (dot dot) sequence in the template parameter. NOTE: this was later reported to affect 1.0.1, and demonstrated for code execution by uploading and accessing an avatar file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
id | EDB-ID:2593 |
References
- http://secunia.com/advisories/22014
- http://secunia.com/advisories/22014
- http://securityreason.com/securityalert/1607
- http://securityreason.com/securityalert/1607
- http://www.osvdb.org/28964
- http://www.osvdb.org/28964
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/bid/20061
- http://www.securityfocus.com/bid/20061
- http://www.securityfocus.com/bid/20616
- http://www.securityfocus.com/bid/20616
- http://www.vupen.com/english/advisories/2006/3688
- http://www.vupen.com/english/advisories/2006/3688
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29673
- https://www.exploit-db.com/exploits/2593
- https://www.exploit-db.com/exploits/2593