CVE-2006-2633
Published May 30, 2006
Last updated 6 years ago
Overview
- Description
- Absolute path traversal vulnerability in the copy action in index.php in Andrew Godwin ByteHoard 2.1 and earlier allows remote authenticated users to create or overwrite files in other users' directories by specifying the absolute path of the directory in the infolder parameter and simultaneously specifying the filename in the filepath parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "902B1D47-E1BE-4035-B5AF-65C63D72D903" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71967055-F995-4C77-B78E-A6D8043B330D" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50F523C8-A910-4CA0-B64E-694C3F790F08" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A57DF785-03EE-4621-BB68-FF417243431D" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9355F79-EA4B-4815-BFF7-4F0828F880FE" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "366259CE-786A-4767-AC73-5A12DB703677" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "035802A5-95C3-4338-AC5A-9E9094CAF2F8" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0DE2CDB-9EF9-477C-B4CE-44D5D99BA63C" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.1_alpha:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72DA5E18-3772-4DAD-B216-4ED479A38CBE" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.1_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D22AE44-044F-4FE8-B980-6159446B88B9" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.1_delta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30788CA8-BD77-4FEA-ACAA-B3C3A0F2FDD9" }, { "criteria": "cpe:2.3:a:andrew_godwin:bytehoard:2.1_gamma:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D1768F-8337-46CF-97DB-8C9BA121C2F8" } ], "operator": "OR" } ] } ]