Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0713

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-0713
Last Modified 07 Mar 2011 09:30:38
Published 15 Feb 2006 06:06:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0713

Summary

Directory traversal vulnerability in LinPHA 1.0 allows remote attackers to include arbitrary files via .. (dot dot) sequences in the (1) lang parameter in docs/index.php and the language parameter in (2) install/install.php, (3) install/sec_stage_install.php, (4) install/third_stage_install.php, and (5) install/forth_stage_install.php. NOTE: direct static code injection is resultant from this issue, as demonstrated by inserting PHP code into the username, which is inserted into linpha.log, which is accessible from the directory traversal.

Vulnerable Systems

Application

  • Linpha 0.9.0

  • Linpha 0.9.1

  • Linpha 0.9.2

  • Linpha 0.9.3

  • Linpha 0.9.4

  • Linpha 1.0


References

VUPEN - ADV-2006-0535

BID - 16592

BUGTRAQ - 20060211 Linpha <= 1.0 multiple arbitrary local inclusion

SECUNIA - 18808

MISC - http://retrogod.altervista.org/linpha_10_local.html

XF - linpha-index-file-include(24663)

SREASON - 426


Last Updated: 27 May 2016 10:41:46