ID CVE-2006-0756
Summary dotProject 2.0.1 and earlier leaves (1) phpinfo.php and (2) check.php accessible under the /docs/ directory after installation, which allows remote attackers to obtain sensitive configuration information. NOTE: the vendor disputes this issue, saying that it could only occur if the administrator ignores the installation instructions as well as warnings generated by check.php
References
Vulnerable Configurations
  • cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 14-05-2024 - 01:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 16648
bugtraq
  • 20060214 dotproject <= 2.0.1 remote code execution
  • 20060215 Re: dotproject <= 2.0.1 remote code execution
osvdb
  • 23207
  • 23208
secunia 18879
sreason 434
vupen ADV-2006-0604
xf dotproject-phpinfo-check-obtain-info(24745)
Last major update 14-05-2024 - 01:34
Published 18-02-2006 - 02:02
Last modified 14-05-2024 - 01:34
Back to Top