ID CVE-2006-1777
Summary Directory traversal vulnerability in doc/index.php in Jeremy Ashcraft Simplog 0.9.2 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the s parameter, as demonstrated by injecting PHP sequences into an Apache error_log file, which is then included by doc/index.php.
References
Vulnerable Configurations
  • cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:*
    cpe:2.3:a:simplog:simplog:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:36)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17490
bugtraq 20060412 Simplog <=0.9.2 multiple vulnerabilities
exploit-db 1663
misc http://retrogod.altervista.org/simplog_092_incl_xpl.html
osvdb 24559
sectrack 1015904
secunia 19628
vupen ADV-2006-1332
xf simplog-index-file-include(25775)
Last major update 18-10-2018 - 16:36
Published 13-04-2006 - 10:02
Last modified 18-10-2018 - 16:36
Back to Top