CVE-2006-1478

Directory traversal vulnerability in (1) initiate.php and (2) possibly other PHP scripts in Turnkey Web Tools PHP Live Helper 1.8, and possibly later versions, allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the language cookie, as demonstrated by uploading PHP code in a gl_session cookie to users.php, which causes the code to be stored in error.log, which is then included by initiate.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:turnkey_web_tools:php_live_helper:1.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:08

Type Values Removed Values Added
References () http://secunia.com/advisories/19428 - () http://secunia.com/advisories/19428 -
References () http://securityreason.com/securityalert/641 - () http://securityreason.com/securityalert/641 -
References () http://www.securityfocus.com/archive/1/428976/100/0/threaded - () http://www.securityfocus.com/archive/1/428976/100/0/threaded -
References () http://www.turnkeywebtools.com/forum/showthread.php?p=10415 - Patch () http://www.turnkeywebtools.com/forum/showthread.php?p=10415 - Patch
References () http://www.worlddefacers.de/Public/WD-TMPLH.txt - Exploit () http://www.worlddefacers.de/Public/WD-TMPLH.txt - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25489 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25489 -

Information

Published : 2006-03-29 01:06

Updated : 2024-11-21 00:08


NVD link : CVE-2006-1478

Mitre link : CVE-2006-1478

CVE.ORG link : CVE-2006-1478


JSON object : View

Products Affected

turnkey_web_tools

  • php_live_helper