Directory traversal vulnerability in index.php in MKPortal 1.0.1 Final allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the language cookie, as demonstrated by using a gl_session cookie to inject PHP sequences into the error.log file, which is then included by index.php with malicious commands accessible by the ind parameter.
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20884 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1234 - | |
References | () http://securitytracker.com/id?1016403 - Exploit | |
References | () http://www.securityfocus.com/archive/1/438614/100/100/threaded - | |
References | () http://www.securityfocus.com/bid/18707 - | |
References | () http://www.vupen.com/english/advisories/2006/2598 - | |
References | () http://www.worlddefacers.de/Public/WD-MKP.txt - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27451 - |
Information
Published : 2006-07-13 00:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3554
Mitre link : CVE-2006-3554
CVE.ORG link : CVE-2006-3554
JSON object : View
Products Affected
mkportal
- mkportal
CWE