Vulnerability Description
Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, followed by a filename ending with "%00" and a .js filename.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cakephp | Cakephp | <= 1.1.7.3363 |
Related Weaknesses (CWE)
References
- http://cakeforge.org/frs/shownotes.php?release_id=134
- http://secunia.com/advisories/22040Vendor Advisory
- http://www.gulftech.org/?node=research&article_id=00114-09212006Exploit
- http://www.securityfocus.com/bid/20150ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29115
- http://cakeforge.org/frs/shownotes.php?release_id=134
- http://secunia.com/advisories/22040Vendor Advisory
- http://www.gulftech.org/?node=research&article_id=00114-09212006Exploit
- http://www.securityfocus.com/bid/20150ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29115
FAQ
What is CVE-2006-5031?
CVE-2006-5031 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in app/webroot/js/vendors.php in Cake Software Foundation CakePHP before 1.1.8.3544 allows remote attackers to read arbitrary files via a .. (dot dot) in the file par...
How severe is CVE-2006-5031?
CVE-2006-5031 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5031?
Check the references section above for vendor advisories and patch information. Affected products include: Cakephp Cakephp.