Vulnerability Description
Directory traversal vulnerability in kgcall.php in KGB 1.87 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the engine parameter, as demonstrated by uploading a file containing PHP code with an image/jpeg content type, and then referencing this file through the engine parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kgb | Kgb | 1.87 |
References
- http://secunia.com/advisories/22152
- http://www.securityfocus.com/bid/20258Exploit
- http://www.vupen.com/english/advisories/2006/3844
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29235
- https://www.exploit-db.com/exploits/2447
- http://secunia.com/advisories/22152
- http://www.securityfocus.com/bid/20258Exploit
- http://www.vupen.com/english/advisories/2006/3844
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29235
- https://www.exploit-db.com/exploits/2447
FAQ
What is CVE-2006-5115?
CVE-2006-5115 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Directory traversal vulnerability in kgcall.php in KGB 1.87 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the engine parameter, as demonstrated by uploadin...
How severe is CVE-2006-5115?
CVE-2006-5115 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5115?
Check the references section above for vendor advisories and patch information. Affected products include: Kgb Kgb.