Directory traversal vulnerability in (1) initiate.php and (2) possibly other PHP scripts in Turnkey Web Tools PHP Live Helper 1.8, and possibly later versions, allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the language cookie, as demonstrated by uploading PHP code in a gl_session cookie to users.php, which causes the code to be stored in error.log, which is then included by initiate.php.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19428 - | |
References | () http://securityreason.com/securityalert/641 - | |
References | () http://www.securityfocus.com/archive/1/428976/100/0/threaded - | |
References | () http://www.turnkeywebtools.com/forum/showthread.php?p=10415 - Patch | |
References | () http://www.worlddefacers.de/Public/WD-TMPLH.txt - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25489 - |
Information
Published : 2006-03-29 01:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1478
Mitre link : CVE-2006-1478
CVE.ORG link : CVE-2006-1478
JSON object : View
Products Affected
turnkey_web_tools
- php_live_helper
CWE