Vulnerability Description
Absolute path traversal vulnerability in admin/logfile.txt in Verity Ultraseek before 5.6.2 allows remote attackers to read arbitrary files via the name variable.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Verity | Ultraseek | <= 5.6.2 |
References
- http://secunia.com/advisories/22892Vendor Advisory
- http://www.osvdb.org/30289
- http://www.securityfocus.com/archive/1/451847/100/0/threaded
- http://www.ultraseek.com/support/docs/RELNOTES.txt
- http://www.ultraseek.com/support/docs/release_notes/ultraseek.5.6.2.txt
- http://www.zerodayinitiative.com/advisories/ZDI-06-042.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30321
- http://secunia.com/advisories/22892Vendor Advisory
- http://www.osvdb.org/30289
- http://www.securityfocus.com/archive/1/451847/100/0/threaded
- http://www.ultraseek.com/support/docs/RELNOTES.txt
- http://www.ultraseek.com/support/docs/release_notes/ultraseek.5.6.2.txt
- http://www.zerodayinitiative.com/advisories/ZDI-06-042.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30321
FAQ
What is CVE-2006-5971?
CVE-2006-5971 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Absolute path traversal vulnerability in admin/logfile.txt in Verity Ultraseek before 5.6.2 allows remote attackers to read arbitrary files via the name variable.
How severe is CVE-2006-5971?
CVE-2006-5971 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5971?
Check the references section above for vendor advisories and patch information. Affected products include: Verity Ultraseek.