ID CVE-2006-1789
Summary Directory traversal vulnerability in pajax_call_dispatcher.php in PAJAX 0.5.1 and earlier allows remote attackers to read arbitrary files via the $className variable. Users of PAJAX should upgrade to the latest version pajax-0.5.2 [1].
References
Vulnerable Configurations
  • cpe:2.3:a:georges_auberger:pajax:*:*:*:*:*:*:*:*
    cpe:2.3:a:georges_auberger:pajax:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:36)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 17519
bugtraq 20060413 PAJAX Remote Code Injection and File Inclusion Vulnerability
fulldisc 20060413 PAJAX Remote Code Injection and File Inclusion Vulnerability
misc http://www.redteam-pentesting.de/advisories/rt-sa-2006-001.php
osvdb 24862
secunia 19653
vupen ADV-2006-1353
xf pajax-pajaxcalldispatcher-dir-traversal(25860)
Last major update 18-10-2018 - 16:36
Published 13-04-2006 - 22:02
Last modified 18-10-2018 - 16:36
Back to Top