Vulnerability Description
Directory traversal vulnerability in inc/functions.inc.php in CuteNews 1.4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to include arbitrary files via a .. (dot dot) sequence and trailing NULL (%00) byte in the archive parameter in an HTTP POST or COOKIE request, which bypasses a sanity check that is only applied to a GET request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cutephp | Cutenews | <= 1.4.1 |
References
- http://hamid.ir/security/cutenews.txtExploit
- http://secunia.com/advisories/19289Vendor Advisory
- http://www.securityfocus.com/archive/1/428434/100/0/threaded
- http://www.securityfocus.com/bid/17152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25324
- http://hamid.ir/security/cutenews.txtExploit
- http://secunia.com/advisories/19289Vendor Advisory
- http://www.securityfocus.com/archive/1/428434/100/0/threaded
- http://www.securityfocus.com/bid/17152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25324
FAQ
What is CVE-2006-1339?
CVE-2006-1339 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in inc/functions.inc.php in CuteNews 1.4.1 and possibly other versions, when register_globals is enabled, allows remote attackers to include arbitrary files via a .. ...
How severe is CVE-2006-1339?
CVE-2006-1339 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1339?
Check the references section above for vendor advisories and patch information. Affected products include: Cutephp Cutenews.