5.8
CVSSv2

CVE-2006-6047

Published: 22/11/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.4
VMScore: 585
Vector: AV:N/AC:L/Au:M/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in manager/index.php in Etomite 0.6.1.2 allows remote authenticated administrators to include and execute arbitrary local files via a .. (dot dot) in the f parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.

Vulnerable Product Search on Vulmon Subscribe to Product

etomite etomite 0.6.1.2

Exploits

#!/usr/bin/perl -w # # Etomite CMS Remote Command Execution # Version: 0612 # Url: wwwetomiteorg # Author : Alfredo Pesoli 'revenge' # Description: # # Input passed to the 'f' parameter in "/manager/indexphp" isn't properly verified before being used in an include function, this can be exploited to include local files on targe ...