Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
References
Configurations
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/xmb_196_sql.html - Exploit | |
References | () http://secunia.com/advisories/21293 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1411 - | |
References | () http://www.securityfocus.com/archive/1/443167/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19494 - | |
References | () http://www.securityfocus.com/bid/19501 - Exploit | |
References | () https://docs.xmbforum2.com/index.php?title=Security_Issue_History - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28356 - | |
References | () https://www.exploit-db.com/exploits/2178 - |
Information
Published : 2006-08-17 01:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4191
Mitre link : CVE-2006-4191
CVE.ORG link : CVE-2006-4191
JSON object : View
Products Affected
xmb_software
- extreme_message_board
CWE