Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.21020
Category:Web application abuses
Title:4Images <= 1.7.1 Directory Traversal Vulnerability
Summary:The remote web server is running 4Images which is prone to; directory traversal attacks.
Description:Summary:
The remote web server is running 4Images which is prone to
directory traversal attacks.

Vulnerability Insight:
The installed application does not validate user-input passed
in the 'template' variable of the 'index.php' file.

Vulnerability Impact:
This allows an attacker to execute directory traversal attacks
and display the content of sensitive files on the system and possibly to execute
arbitrary PHP code if he can write to local files through some other means.

Solution:
Sanitize the 'index.php' file.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0899
BugTraq ID: 16855
http://www.securityfocus.com/bid/16855
Bugtraq: 20060301 4images <=1.7.1 remote code execution (Google Search)
http://www.securityfocus.com/archive/1/426468/100/0/threaded
https://www.exploit-db.com/exploits/1533
http://retrogod.altervista.org/4images_171_adv.html
http://www.osvdb.org/23529
http://secunia.com/advisories/19026
http://securityreason.com/securityalert/518
http://www.vupen.com/english/advisories/2006/0754
XForce ISS Database: 4images-template-file-include(24938)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24938
CopyrightCopyright (C) 2006 Ferdy Riphagen

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.