92 lines
2.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2006-1480",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-03-29T01:06:00.000",
"lastModified": "2017-10-19T01:29:04.457",
"vulnStatus": "Modified",
"evaluatorSolution": "Successful exploitation requires that the \"magic_quotes_gpc\" parameter is disabled.\r\n",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in start.php in WebAlbum 2.02 allows remote attackers to include arbitrary files and execute commands by (1) injecting code into local log files via GET commands, then (2) accessing that log via a .. (dot dot) sequence and a trailing null (%00) byte in the skin2 COOKIE parameter."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:duda:webalbum:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.02",
"matchCriteriaId": "B96EABED-416D-4887-BB1F-EDBC622B50F7"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/17228",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.vupen.com/english/advisories/2006/1108",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25443",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/1608",
"source": "cve@mitre.org"
}
]
}