CVE-2006-4731
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/09/2006
Última modificación:
03/04/2025
Descripción
Vulnerabilidad de atravesamiento de directorios en (1) login.pl y (2) admin.pl en (a) SQL-Ledger anterior a 2.6.19 y (b) LedgerSMB anterior a 1.0.0p1 , permite a un atacante remoto ejecutar código Perl de su elección a través de un valor de parámetro terminal no especificado que contiene ../ (punto punto barra).
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dws_systems_inc.:sql-ledger:2.4.6:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/21824
- http://secunia.com/advisories/21886
- http://securityreason.com/securityalert/1553
- http://sourceforge.net/project/shownotes.php?group_id=175965&release_id=446778
- http://svn.sourceforge.net/viewvc/ledger-smb/trunk/login.pl?r1=53&r2=69
- http://www.securityfocus.com/archive/1/445817/100/0/threaded
- http://www.securityfocus.com/bid/19960
- http://www.sql-ledger.org/cgi-bin/nav.pl?page=news.html&title=What%27s%20New
- http://www.vupen.com/english/advisories/2006/3554
- http://www.vupen.com/english/advisories/2006/3555
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28885
- http://secunia.com/advisories/21824
- http://secunia.com/advisories/21886
- http://securityreason.com/securityalert/1553
- http://sourceforge.net/project/shownotes.php?group_id=175965&release_id=446778
- http://svn.sourceforge.net/viewvc/ledger-smb/trunk/login.pl?r1=53&r2=69
- http://www.securityfocus.com/archive/1/445817/100/0/threaded
- http://www.securityfocus.com/bid/19960
- http://www.sql-ledger.org/cgi-bin/nav.pl?page=news.html&title=What%27s%20New
- http://www.vupen.com/english/advisories/2006/3554
- http://www.vupen.com/english/advisories/2006/3555
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28885



