Vulnerability Description
Directory traversal vulnerability in pm.php in Phorum 5 allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[template] parameter, as demonstrated by injecting PHP sequences into a log file, which is then included by pm.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phorum | Phorum | <= 5.1.14 |
References
- http://retrogod.altervista.org/phorum5_local_incl_xpl.htmlExploit
- http://www.phorum.org/phorum5/read.php?14%2C114358
- http://www.securityfocus.com/archive/1/439976/100/0/threaded
- http://www.vupen.com/english/advisories/2006/2794
- http://retrogod.altervista.org/phorum5_local_incl_xpl.htmlExploit
- http://www.phorum.org/phorum5/read.php?14%2C114358
- http://www.securityfocus.com/archive/1/439976/100/0/threaded
- http://www.vupen.com/english/advisories/2006/2794
FAQ
What is CVE-2006-3611?
CVE-2006-3611 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Directory traversal vulnerability in pm.php in Phorum 5 allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[template] parame...
How severe is CVE-2006-3611?
CVE-2006-3611 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3611?
Check the references section above for vendor advisories and patch information. Affected products include: Phorum Phorum.