Directory traversal vulnerability in newpost.php in Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence and trailing null (%00) byte in the id parameter, as demonstrated by injecting a Perl CGI script using "[NR]" sequences in the message parameter, then calling close.php with modified id and t_id parameters to chmod the script. NOTE: this issue might be resultant from dynamic variable evaluation.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/1138 - | |
References | () http://www.securityfocus.com/archive/1/437875/100/0/threaded - |
Information
Published : 2006-06-24 01:06
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3207
Mitre link : CVE-2006-3207
CVE.ORG link : CVE-2006-3207
JSON object : View
Products Affected
ultimate_php_board
- ultimate_php_board
CWE