{ "id": "CVE-2006-4140", "sourceIdentifier": "cve@mitre.org", "published": "2006-08-14T23:04:00.000", "lastModified": "2024-11-21T00:15:15.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) \"..%2f\" (encoded \"/\" slash), \"..../\" (multiple dot), and \"..%255c../\" (double-encoded \"\\\" backslash)." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorios en IPCheck Server Monitor anterior 5.3.3.639/640 permite a un atacante remoto leer archivos de su elecci\u00f3n a trav\u00e9s de la secuencia modificada .. (punto punto) en la URL, incluyendo (1) \"..%2f\" (codificaci\u00f3n \"/\" barra), \"..../\" (multiples puntos), y \"..%255c../\" (doble-codificaci\u00f3n \"\\\" barra invertida)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*", "matchCriteriaId": "D893AA0C-7C8A-4932-B6E9-96CE9C932AC9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*", "matchCriteriaId": "50A39A25-9AAC-4408-AB31-0B09903FD641" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*", "matchCriteriaId": "D4234547-7D3E-4893-8FEE-9AFE619ED4FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*", "matchCriteriaId": "E2AFE26C-54D9-498E-BB50-2778A852EBB2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*", "matchCriteriaId": "0BF9E20B-664A-49C4-9404-CD52E816650F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*", "matchCriteriaId": "A6A738C8-BC16-44C2-A086-9C0AD3B4B388" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5CE47-EA55-4879-A1A2-CE57821961A4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*", "matchCriteriaId": "910BA740-01C5-40C9-BE6C-9389BD9B9C9A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*", "matchCriteriaId": "AB962CF1-44D1-4D2E-9EA4-3835BE0E3B03" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*", "matchCriteriaId": "CE6B279D-9367-4DFB-B60C-C577215EBC8B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*", "matchCriteriaId": "A7648BA8-8F02-4DF1-A763-96EF599895BE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*", "matchCriteriaId": "FDF7387A-4A43-4CF1-8717-8710772EBACA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*", "matchCriteriaId": "C057AED9-565E-4B16-849B-B9FD9C0FF341" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*", "matchCriteriaId": "56B364DE-C33B-431E-AB26-069DDF132B66" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*", "matchCriteriaId": "40D2BAE0-C1EA-4836-9E70-93C30D8E6242" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*", "matchCriteriaId": "9997D3EA-9CA4-439B-8386-3E6A24A05D5C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*", "matchCriteriaId": "C0D11DE7-F2FE-4FBE-B8B0-4B1471AF787E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*", "matchCriteriaId": "2FFE35FA-8861-4F1A-82CC-4CEBC6BF45FE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*", "matchCriteriaId": "C0A25FEC-DDB7-493A-8FD4-DDD2565FB848" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*", "matchCriteriaId": "BCF38CB0-5253-4D32-89E1-8F3E515983AF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*", "matchCriteriaId": "E39296C3-ED79-40DC-8D82-FDBE8D80E545" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*", "matchCriteriaId": "7075DFAE-75ED-4CBC-99FC-862075394ADC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*", "matchCriteriaId": "3EDD8498-245E-4E18-984F-06CA179D6301" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*", "matchCriteriaId": "7C33747D-6584-4D51-A906-71F545BE78A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*", "matchCriteriaId": "085438B9-B318-46A9-A9C0-43ECDB4F043C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*", "matchCriteriaId": "E07FDAA9-24A0-4805-B67B-15FD25C10296" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*", "matchCriteriaId": "B2FD5462-4996-4349-9ACE-BC2A8AB17E70" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*", "matchCriteriaId": "EA60EC11-B955-4ED6-8FBA-C9082EFC8BF7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*", "matchCriteriaId": "FC7D9496-8AA4-495E-AB2F-8242D34FBFA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*", "matchCriteriaId": "AA4955AE-4666-4497-9C04-5ACF2D45DAC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*", "matchCriteriaId": "607B59F7-B643-4C16-9EA9-007AFEE95340" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*", "matchCriteriaId": "96A17536-2CAC-4F73-8649-D72FFFF4B142" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*", "matchCriteriaId": "7AF94D78-4D7B-4983-8514-65676D61BC17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*", "matchCriteriaId": "840DBDE7-DDEC-4CC0-BA60-A3EE1B76A483" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*", "matchCriteriaId": "AD414917-1AFB-4DC2-B2A4-9635DF774B81" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/21468", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/1389", "source": "cve@mitre.org" }, { "url": "http://securitytracker.com/id?1016676", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733", "source": "cve@mitre.org" }, { "url": "http://www.paessler.com/ipcheck/history", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/442822/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/archive/1/444227/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/19473", "source": "cve@mitre.org", "tags": [ "Exploit" ] }, { "url": "http://www.vupen.com/english/advisories/2006/3259", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28341", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/21468", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://securityreason.com/securityalert/1389", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://securitytracker.com/id?1016676", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.paessler.com/ipcheck/history", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/442822/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/444227/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/19473", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ] }, { "url": "http://www.vupen.com/english/advisories/2006/3259", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28341", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }