2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-4140" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-08-14T23:04:00.000" ,
2024-11-22 03:16:05 +00:00
"lastModified" : "2024-11-21T00:15:15.460" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) \"..%2f\" (encoded \"/\" slash), \"..../\" (multiple dot), and \"..%255c../\" (double-encoded \"\\\" backslash)."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de salto de directorios en IPCheck Server Monitor anterior 5.3.3.639/640 permite a un atacante remoto leer archivos de su elecci\u00f3n a trav\u00e9s de la secuencia modificada .. (punto punto) en la URL, incluyendo (1) \"..%2f\" (codificaci\u00f3n \"/\" barra), \"..../\" (multiples puntos), y \"..%255c../\" (doble-codificaci\u00f3n \"\\\" barra invertida)."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:N/A:N" ,
2024-11-22 03:16:05 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-22 03:16:05 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D893AA0C-7C8A-4932-B6E9-96CE9C932AC9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50A39A25-9AAC-4408-AB31-0B09903FD641"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4234547-7D3E-4893-8FEE-9AFE619ED4FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2AFE26C-54D9-498E-BB50-2778A852EBB2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0BF9E20B-664A-49C4-9404-CD52E816650F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6A738C8-BC16-44C2-A086-9C0AD3B4B388"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6FE5CE47-EA55-4879-A1A2-CE57821961A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "910BA740-01C5-40C9-BE6C-9389BD9B9C9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB962CF1-44D1-4D2E-9EA4-3835BE0E3B03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE6B279D-9367-4DFB-B60C-C577215EBC8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A7648BA8-8F02-4DF1-A763-96EF599895BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDF7387A-4A43-4CF1-8717-8710772EBACA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C057AED9-565E-4B16-849B-B9FD9C0FF341"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "56B364DE-C33B-431E-AB26-069DDF132B66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40D2BAE0-C1EA-4836-9E70-93C30D8E6242"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9997D3EA-9CA4-439B-8386-3E6A24A05D5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0D11DE7-F2FE-4FBE-B8B0-4B1471AF787E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2FFE35FA-8861-4F1A-82CC-4CEBC6BF45FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0A25FEC-DDB7-493A-8FD4-DDD2565FB848"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BCF38CB0-5253-4D32-89E1-8F3E515983AF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E39296C3-ED79-40DC-8D82-FDBE8D80E545"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7075DFAE-75ED-4CBC-99FC-862075394ADC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3EDD8498-245E-4E18-984F-06CA179D6301"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C33747D-6584-4D51-A906-71F545BE78A1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "085438B9-B318-46A9-A9C0-43ECDB4F043C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E07FDAA9-24A0-4805-B67B-15FD25C10296"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B2FD5462-4996-4349-9ACE-BC2A8AB17E70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA60EC11-B955-4ED6-8FBA-C9082EFC8BF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC7D9496-8AA4-495E-AB2F-8242D34FBFA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA4955AE-4666-4497-9C04-5ACF2D45DAC8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "607B59F7-B643-4C16-9EA9-007AFEE95340"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96A17536-2CAC-4F73-8649-D72FFFF4B142"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AF94D78-4D7B-4983-8514-65676D61BC17"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "840DBDE7-DDEC-4CC0-BA60-A3EE1B76A483"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD414917-1AFB-4DC2-B2A4-9635DF774B81"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/21468" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/1389" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016676" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.paessler.com/ipcheck/history" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/442822/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/444227/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/19473" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3259" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28341" ,
"source" : "cve@mitre.org"
2024-11-22 03:16:05 +00:00
} ,
{
"url" : "http://secunia.com/advisories/21468" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securityreason.com/securityalert/1389" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1016676" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.paessler.com/ipcheck/history" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/442822/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/444227/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/19473" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3259" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28341" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}