Directory traversal vulnerability in the editnews module (inc/editnews.mdu) in index.php in CuteNews 1.4.1 allows remote attackers to read or modify files via the source parameter in the (1) editnews or (2) doeditnews action. NOTE: this can also produce resultant XSS when the target file does not exist.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/775 - | |
References | () http://www.securityfocus.com/archive/1/431340/30/0/threaded - Exploit | |
References | () http://www.securityfocus.com/archive/1/431528/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17592 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25935 - |
Information
Published : 2006-04-20 18:06
Updated : 2024-11-21 00:10
NVD link : CVE-2006-1925
Mitre link : CVE-2006-1925
CVE.ORG link : CVE-2006-1925
JSON object : View
Products Affected
cutephp
- cutenews
CWE