Directory traversal vulnerability in the "remember me" feature in liveuser.php in PHP Extension and Application Repository (PEAR) LiveUser 0.16.8 and earlier allows remote attackers to determine file existence, and possibly delete arbitrary files with short pathnames or possibly read arbitrary files, via a .. (dot dot) in the store_id value of a cookie.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://pear.php.net/package/LiveUser/download/ - Patch | |
References | () http://securityreason.com/securityalert/466 - | |
References | () http://securitytracker.com/id?1015659 - Patch | |
References | () http://www.gulftech.org/?node=research&article_id=00103-02212006 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/425711/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16761 - | |
References | () http://www.vupen.com/english/advisories/2006/0697 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24852 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24853 - |
Information
Published : 2006-02-23 23:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0869
Mitre link : CVE-2006-0869
CVE.ORG link : CVE-2006-0869
JSON object : View
Products Affected
pear
- pear_liveuser
CWE