Vulnerability Description
Directory traversal vulnerability in Zen Cart 1.3.0.2 and earlier allows remote attackers to include and possibly execute arbitrary local files via directory traversal sequences in the typefilter parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zen Cart | Zen Cart | 1.2.0d |
References
- http://secunia.com/advisories/21484PatchVendor Advisory
- http://www.gulftech.org/?node=research&article_id=00109-08152006Exploit
- http://www.securityfocus.com/bid/19543
- http://www.vupen.com/english/advisories/2006/3283
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28395
- http://secunia.com/advisories/21484PatchVendor Advisory
- http://www.gulftech.org/?node=research&article_id=00109-08152006Exploit
- http://www.securityfocus.com/bid/19543
- http://www.vupen.com/english/advisories/2006/3283
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28395
FAQ
What is CVE-2006-4218?
CVE-2006-4218 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in Zen Cart 1.3.0.2 and earlier allows remote attackers to include and possibly execute arbitrary local files via directory traversal sequences in the typefilter para...
How severe is CVE-2006-4218?
CVE-2006-4218 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4218?
Check the references section above for vendor advisories and patch information. Affected products include: Zen Cart Zen Cart.