CVE-2006-1777
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/04/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Directory traversal vulnerability in doc/index.php in Jeremy Ashcraft Simplog 0.9.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the s parameter, as demonstrated by injecting PHP sequences into an Apache error_log file, which is then included by doc/index.php.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:* | 0.9.2 (incluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://retrogod.altervista.org/simplog_092_incl_xpl.html
- http://secunia.com/advisories/19628
- http://securitytracker.com/id?1015904=
- http://www.osvdb.org/24559
- http://www.securityfocus.com/archive/1/430743/100/0/threaded
- http://www.securityfocus.com/bid/17490
- http://www.vupen.com/english/advisories/2006/1332
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25775
- https://www.exploit-db.com/exploits/1663
- http://retrogod.altervista.org/simplog_092_incl_xpl.html
- http://secunia.com/advisories/19628
- http://securitytracker.com/id?1015904=
- http://www.osvdb.org/24559
- http://www.securityfocus.com/archive/1/430743/100/0/threaded
- http://www.securityfocus.com/bid/17490
- http://www.vupen.com/english/advisories/2006/1332
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25775
- https://www.exploit-db.com/exploits/1663