ID CVE-2006-0625
Summary Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
References
Vulnerable Configurations
  • cpe:2.3:a:spip:spip:1.8.2d:*:*:*:*:*:*:*
    cpe:2.3:a:spip:spip:1.8.2d:*:*:*:*:*:*:*
  • cpe:2.3:a:spip:spip:1.8.2e:*:*:*:*:*:*:*
    cpe:2.3:a:spip:spip:1.8.2e:*:*:*:*:*:*:*
  • cpe:2.3:a:spip:spip:1.8.2g:*:*:*:*:*:*:*
    cpe:2.3:a:spip:spip:1.8.2g:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
refmap via4
bid 16556
misc http://retrogod.altervista.org/spip_182g_shell_inj_xpl.html
osvdb 23086
sectrack 1015602
secunia 18676
vupen ADV-2006-0483
xf spip-rss-file-include(24600)
Last major update 20-07-2017 - 01:29
Published 09-02-2006 - 18:06
Last modified 20-07-2017 - 01:29
Back to Top