CVE-2006-0869

Directory traversal vulnerability in the "remember me" feature in liveuser.php in PHP Extension and Application Repository (PEAR) LiveUser 0.16.8 and earlier allows remote attackers to determine file existence, and possibly delete arbitrary files with short pathnames or possibly read arbitrary files, via a .. (dot dot) in the store_id value of a cookie.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pear:pear_liveuser:0.3:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.5:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.6:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.7:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.8:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.9:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.13.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.13.2:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.13.3:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.15.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.15.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.0:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.1:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.2:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.3:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.4:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.5:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.6:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.7:*:*:*:*:*:*:*
cpe:2.3:a:pear:pear_liveuser:0.16.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://pear.php.net/package/LiveUser/download/ - Patch () http://pear.php.net/package/LiveUser/download/ - Patch
References () http://securityreason.com/securityalert/466 - () http://securityreason.com/securityalert/466 -
References () http://securitytracker.com/id?1015659 - Patch () http://securitytracker.com/id?1015659 - Patch
References () http://www.gulftech.org/?node=research&article_id=00103-02212006 - Vendor Advisory () http://www.gulftech.org/?node=research&article_id=00103-02212006 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/425711/100/0/threaded - () http://www.securityfocus.com/archive/1/425711/100/0/threaded -
References () http://www.securityfocus.com/bid/16761 - () http://www.securityfocus.com/bid/16761 -
References () http://www.vupen.com/english/advisories/2006/0697 - () http://www.vupen.com/english/advisories/2006/0697 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24852 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24852 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24853 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24853 -

Information

Published : 2006-02-23 23:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0869

Mitre link : CVE-2006-0869

CVE.ORG link : CVE-2006-0869


JSON object : View

Products Affected

pear

  • pear_liveuser