![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.21020 |
Category: | Web application abuses |
Title: | 4Images <= 1.7.1 Directory Traversal Vulnerability |
Summary: | The remote web server is running 4Images which is prone to; directory traversal attacks. |
Description: | Summary: The remote web server is running 4Images which is prone to directory traversal attacks. Vulnerability Insight: The installed application does not validate user-input passed in the 'template' variable of the 'index.php' file. Vulnerability Impact: This allows an attacker to execute directory traversal attacks and display the content of sensitive files on the system and possibly to execute arbitrary PHP code if he can write to local files through some other means. Solution: Sanitize the 'index.php' file. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-0899 BugTraq ID: 16855 http://www.securityfocus.com/bid/16855 Bugtraq: 20060301 4images <=1.7.1 remote code execution (Google Search) http://www.securityfocus.com/archive/1/426468/100/0/threaded https://www.exploit-db.com/exploits/1533 http://retrogod.altervista.org/4images_171_adv.html http://www.osvdb.org/23529 http://secunia.com/advisories/19026 http://securityreason.com/securityalert/518 http://www.vupen.com/english/advisories/2006/0754 XForce ISS Database: 4images-template-file-include(24938) https://exchange.xforce.ibmcloud.com/vulnerabilities/24938 |
Copyright | Copyright (C) 2006 Ferdy Riphagen |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |