ID CVE-2006-5316
Summary registroTL stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for /usuarios.dat.
References
Vulnerable Configurations
  • cpe:2.3:a:phplibre:registrotl:0.1b:*:*:*:*:*:*:*
    cpe:2.3:a:phplibre:registrotl:0.1b:*:*:*:*:*:*:*
  • cpe:2.3:a:phplibre:registrotl:0.5b:*:*:*:*:*:*:*
    cpe:2.3:a:phplibre:registrotl:0.5b:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 17-10-2018 - 21:42)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
bugtraq 20061007 7 php scripts File Inclusion / Source disclosure Vuln
exploit-db 2502
misc http://acid-root.new.fr/poc/13061007.txt
sreason 1734
Last major update 17-10-2018 - 21:42
Published 17-10-2006 - 17:07
Last modified 17-10-2018 - 21:42
Back to Top