Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://forums.invisionpower.com/index.php?showtopic=213374 - Patch | |
References | () http://secunia.com/advisories/19830 - | |
References | () http://securityreason.com/securityalert/796 - | |
References | () http://www.osvdb.org/25008 - | |
References | () http://www.securityfocus.com/archive/1/431990/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/432226/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/439607/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/1534 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26072 - |
Information
Published : 2006-04-26 20:06
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2060
Mitre link : CVE-2006-2060
CVE.ORG link : CVE-2006-2060
JSON object : View
Products Affected
invision_power_services
- invision_power_board
CWE