CVE-2006-0756
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/02/2006
Last modified:
03/04/2025
Description
dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/18879
- http://securityreason.com/securityalert/434
- http://www.osvdb.org/23207
- http://www.osvdb.org/23208
- http://www.securityfocus.com/archive/1/424957/100/0/threaded
- http://www.securityfocus.com/archive/1/425285/100/0/threaded
- http://www.securityfocus.com/bid/16648
- http://www.vupen.com/english/advisories/2006/0604
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24745
- http://secunia.com/advisories/18879
- http://securityreason.com/securityalert/434
- http://www.osvdb.org/23207
- http://www.osvdb.org/23208
- http://www.securityfocus.com/archive/1/424957/100/0/threaded
- http://www.securityfocus.com/archive/1/425285/100/0/threaded
- http://www.securityfocus.com/bid/16648
- http://www.vupen.com/english/advisories/2006/0604
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24745



