Vulnerability Description
Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Plx Web Studio | Plx Pay | <= 3.2 |
References
- http://secunia.com/advisories/23190PatchVendor Advisory
- http://www.securityfocus.com/bid/21379Vendor Advisory
- http://www.vupen.com/english/advisories/2006/4809
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30619
- http://secunia.com/advisories/23190PatchVendor Advisory
- http://www.securityfocus.com/bid/21379Vendor Advisory
- http://www.vupen.com/english/advisories/2006/4809
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30619
FAQ
What is CVE-2006-6392?
CVE-2006-6392 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credential...
How severe is CVE-2006-6392?
CVE-2006-6392 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6392?
Check the references section above for vendor advisories and patch information. Affected products include: Plx Web Studio Plx Pay.