Directory traversal vulnerability in index.php in phpSysInfo 2.5.1 allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) sequence and a trailing null (%00) byte in the lng parameter, which will display a different error message if the file exists.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html | Broken Link Exploit |
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html | Broken Link Exploit |
http://secunia.com/advisories/20939 | Broken Link Vendor Advisory |
http://securitytracker.com/id?1016440 | Broken Link Third Party Advisory VDB Entry |
http://www.osvdb.org/27015 | Broken Link |
http://www.securityfocus.com/bid/18868 | Broken Link Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2006/2668 | Broken Link Permissions Required Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27527 | Third Party Advisory VDB Entry |
https://github.com/advisories/GHSA-2wxv-3g4v-p76p | Third Party Advisory |
https://github.com/phpsysinfo/phpsysinfo/issues/368#issuecomment-1380842745 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2006-07-06 20:05
Updated : 2024-02-28 10:42
NVD link : CVE-2006-3360
Mitre link : CVE-2006-3360
CVE.ORG link : CVE-2006-3360
JSON object : View
Products Affected
phpsysinfo
- phpsysinfo
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')