Vulnerability Description
Directory traversal vulnerability in classes/index.php in Lithium CMS 4.04c and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the siteconf[curl] parameter, as demonstrated by a POST to news/comment.php containing PHP code, which is stored under db/comments/news/ and included by classes/index.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lithium Cms | Lithium Cms | <= 4.04c |
References
- http://secunia.com/advisories/22593
- http://www.securityfocus.com/bid/20871Exploit
- http://www.vupen.com/english/advisories/2006/4361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29966
- https://www.exploit-db.com/exploits/2702
- http://secunia.com/advisories/22593
- http://www.securityfocus.com/bid/20871Exploit
- http://www.vupen.com/english/advisories/2006/4361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29966
- https://www.exploit-db.com/exploits/2702
FAQ
What is CVE-2006-5731?
CVE-2006-5731 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Directory traversal vulnerability in classes/index.php in Lithium CMS 4.04c and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the siteconf[curl] pa...
How severe is CVE-2006-5731?
CVE-2006-5731 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5731?
Check the references section above for vendor advisories and patch information. Affected products include: Lithium Cms Lithium Cms.