Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html - Exploit | |
References | () http://secunia.com/advisories/18676 - | |
References | () http://securitytracker.com/id?1015602 - | |
References | () http://www.osvdb.org/23086 - | |
References | () http://www.securityfocus.com/bid/16556 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0483 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24600 - |
Information
Published : 2006-02-09 18:06
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0625
Mitre link : CVE-2006-0625
CVE.ORG link : CVE-2006-0625
JSON object : View
Products Affected
spip
- spip
CWE