CVE-2006-0625
Published Feb 9, 2006
Last updated 7 years ago
Overview
- Description
- Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:spip:spip:1.8.2d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1801D09-E761-41F5-97E8-4C4F882D6C3E" }, { "criteria": "cpe:2.3:a:spip:spip:1.8.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D3C57F2-B911-4EE3-9988-913D9D11567D" }, { "criteria": "cpe:2.3:a:spip:spip:1.8.2g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB8D5C97-A36D-4E53-A591-20FE20AF00B5" } ], "operator": "OR" } ] } ]