CVE-2006-3426
Published Jul 7, 2006
Last updated 6 years ago
Overview
- Description
- Directory traversal vulnerability in (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (b) Novell ZENworks 6.2 SR1 and earlier allows remote attackers to overwrite arbitrary files and directories via a .. (dot dot) sequence in the (1) action, (2) agentid, or (3) index parameters to dagent/nwupload.asp, which are used as pathname components.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lumension:patchlink_update_server:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "188E8F59-0F22-4C43-8B16-CC5637BF6AFB" }, { "criteria": "cpe:2.3:a:lumension:patchlink_update_server:6.2.0.181:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7704C648-6295-4145-BD2C-77E62DF55196" }, { "criteria": "cpe:2.3:a:lumension:patchlink_update_server:6.2.0.189:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8171827-A661-4492-BD53-8DEB2F3759A7" }, { "criteria": "cpe:2.3:a:novell:zenworks:*:sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B1706D5-7465-48C0-8C96-C6798A73B35F", "versionEndIncluding": "6.2" } ], "operator": "OR" } ] } ]