cve/2006/CVE-2006-6445.md
2024-06-09 00:33:16 +00:00

19 lines
827 B
Markdown

### [CVE-2006-6445](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6445)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
### POC
#### Reference
- https://www.exploit-db.com/exploits/2888
- https://www.exploit-db.com/exploits/2888
#### Github
No PoCs found on GitHub currently.