5
CVSSv2

CVE-2006-4140

Published: 14/08/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in IPCheck Server Monitor prior to 5.3.3.639/640 allows remote malicious users to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).

Vulnerable Product Search on Vulmon Subscribe to Product

ipcheck server monitor 4.4.1.522

ipcheck server monitor 5.0.1.272

ipcheck server monitor 5.2.0.405

ipcheck server monitor 5.2.0.418

ipcheck server monitor 5.3.0.509

ipcheck server monitor 5.3.1.574

ipcheck server monitor 5.3.1.587

ipcheck server monitor 5.3.2.605

ipcheck server monitor 4.3.1.368

ipcheck server monitor 5.0.1.321

ipcheck server monitor 5.1.0.341

ipcheck server monitor 5.1.0.342

ipcheck server monitor 5.2.2.451

ipcheck server monitor 5.3.0.506

ipcheck server monitor 5.3.1.579

ipcheck server monitor 5.3.1.580

ipcheck server monitor 5.3.2.616

ipcheck server monitor 5.3.2.617

ipcheck server monitor 5.0.1.299

ipcheck server monitor 5.0.1.309

ipcheck server monitor 5.2.0.420

ipcheck server monitor 5.2.2.449

ipcheck server monitor 5.3.1.575

ipcheck server monitor 5.3.1.578

ipcheck server monitor 5.3.2.606

ipcheck server monitor 5.3.2.609

ipcheck server monitor 5.3.2.610

ipcheck server monitor 4.3.1.382

ipcheck server monitor 4.4.1.521

ipcheck server monitor 5.1.0.345

ipcheck server monitor 5.2.0.404

ipcheck server monitor 5.3.0.507

ipcheck server monitor 5.3.0.508

ipcheck server monitor 5.3.1.581

ipcheck server monitor 5.3.1.586

Exploits

source: wwwsecurityfocuscom/bid/19473/info IPCheck Server Monitor is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application Information obtained ma ...