6.4
CVSSv2

CVE-2006-0625

Published: 09/02/2006 Updated: 20/07/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and previous versions allows remote malicious users to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

Vulnerable Product Search on Vulmon Subscribe to Product

spip spip 1.8.2d

spip spip 1.8.2e

spip spip 1.8.2g

Vendor Advisories

Debian Bug report logs - #352076 spip: Input validation vulnerability in SPIP Spip_RSSPHP Package: spip; Maintainer for spip is David Prévot <taffit@debianorg>; Source for spip is src:spip (PTS, buildd, popcon) Reported by: Micah Anderson <micah@debianorg> Date: Thu, 9 Feb 2006 16:04:02 UTC Severity: normal ...

Exploits

source: wwwsecurityfocuscom/bid/16556/info SPIP is prone to a remote command-execution vulnerability This is due to a lack of proper sanitization of user-supplied input An attacker can exploit this issue to execute arbitrary remote PHP commands on an affected computer with the privileges of the webserver process Successful exploitati ...