Directory traversal vulnerability in PHPList 2.10.2 and earlier allows remote attackers to include arbitrary local files via the (1) GLOBALS[database_module] or (2) GLOBALS[language_module] parameters, which overwrite the underlying $GLOBALS variable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.securityfocus.com/vulnerabilities/exploits/PHPList-lfi.php - Exploit | |
References | () http://securitytracker.com/id?1015889 - | |
References | () http://tincan.co.uk/?lid=851 - | |
References | () http://www.securityfocus.com/archive/1/430475/30/30/threaded - Exploit | |
References | () http://www.securityfocus.com/archive/1/430597 - Patch | |
References | () http://www.securityfocus.com/archive/1/448411 - | |
References | () http://www.securityfocus.com/bid/17429 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1296 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25701 - |
Information
Published : 2006-04-12 22:02
Updated : 2024-11-21 00:09
NVD link : CVE-2006-1746
Mitre link : CVE-2006-1746
CVE.ORG link : CVE-2006-1746
JSON object : View
Products Affected
tincan
- phplist
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')