CVE-2006-0756

dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://secunia.com/advisories/18879 - Vendor Advisory () http://secunia.com/advisories/18879 - Vendor Advisory
References () http://securityreason.com/securityalert/434 - () http://securityreason.com/securityalert/434 -
References () http://www.osvdb.org/23207 - () http://www.osvdb.org/23207 -
References () http://www.osvdb.org/23208 - () http://www.osvdb.org/23208 -
References () http://www.securityfocus.com/archive/1/424957/100/0/threaded - () http://www.securityfocus.com/archive/1/424957/100/0/threaded -
References () http://www.securityfocus.com/archive/1/425285/100/0/threaded - () http://www.securityfocus.com/archive/1/425285/100/0/threaded -
References () http://www.securityfocus.com/bid/16648 - Exploit () http://www.securityfocus.com/bid/16648 - Exploit
References () http://www.vupen.com/english/advisories/2006/0604 - () http://www.vupen.com/english/advisories/2006/0604 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24745 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24745 -

07 Nov 2023, 01:58

Type Values Removed Values Added
Summary ** DISPUTED ** dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php. dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php

Information

Published : 2006-02-18 02:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0756

Mitre link : CVE-2006-0756

CVE.ORG link : CVE-2006-0756


JSON object : View

Products Affected

dotproject

  • dotproject