Vulnerability Description
Directory traversal vulnerability in install05.php in Simple PHP Blog (SPB) 0.4.7.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in the blog_language parameter, as demonstrated by injecting PHP sequences into an Apache access_log file, which is then included using install05.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alexander Palmo | Simple Php Blog | <= 0.4.7.1 |
References
- http://secunia.com/advisories/19270
- http://sourceforge.net/forum/forum.php?forum_id=564904
- http://www.attrition.org/pipermail/vim/2006-November/001138.html
- http://www.securityfocus.com/bid/17102Exploit
- http://www.vupen.com/english/advisories/2006/1007
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25322
- https://www.exploit-db.com/exploits/1581
- http://secunia.com/advisories/19270
- http://sourceforge.net/forum/forum.php?forum_id=564904
- http://www.attrition.org/pipermail/vim/2006-November/001138.html
- http://www.securityfocus.com/bid/17102Exploit
- http://www.vupen.com/english/advisories/2006/1007
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25322
- https://www.exploit-db.com/exploits/1581
FAQ
What is CVE-2006-1243?
CVE-2006-1243 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in install05.php in Simple PHP Blog (SPB) 0.4.7.1 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences a...
How severe is CVE-2006-1243?
CVE-2006-1243 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1243?
Check the references section above for vendor advisories and patch information. Affected products include: Alexander Palmo Simple Php Blog.