Vulnerability Description
Directory traversal vulnerability in print.php in Stefan Ernst Newsscript (aka WM-News) 0.5 beta allows remote attackers to read arbitrary files via a .. (dot dot) in the ide parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stefan Ernst | Newsscript | 0.5_beta |
References
- http://secunia.com/advisories/21826Vendor Advisory
- http://securityreason.com/securityalert/1574
- http://www.osvdb.org/28811
- http://www.securityfocus.com/archive/1/445818/100/0/threaded
- http://www.vupen.com/english/advisories/2006/3558
- http://secunia.com/advisories/21826Vendor Advisory
- http://securityreason.com/securityalert/1574
- http://www.osvdb.org/28811
- http://www.securityfocus.com/archive/1/445818/100/0/threaded
- http://www.vupen.com/english/advisories/2006/3558
FAQ
What is CVE-2006-4766?
CVE-2006-4766 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in print.php in Stefan Ernst Newsscript (aka WM-News) 0.5 beta allows remote attackers to read arbitrary files via a .. (dot dot) in the ide parameter.
How severe is CVE-2006-4766?
CVE-2006-4766 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4766?
Check the references section above for vendor advisories and patch information. Affected products include: Stefan Ernst Newsscript.