Vulnerability Description
Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envolution | Envolution | 1.1.0 |
References
- http://www.securityfocus.com/bid/21413
- http://www.vupen.com/english/advisories/2006/4836
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30700
- https://www.exploit-db.com/exploits/2888
- http://www.securityfocus.com/bid/21413
- http://www.vupen.com/english/advisories/2006/4836
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30700
- https://www.exploit-db.com/exploits/2888
FAQ
What is CVE-2006-6445?
CVE-2006-6445 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in error.php in Envolution 1.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) param...
How severe is CVE-2006-6445?
CVE-2006-6445 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6445?
Check the references section above for vendor advisories and patch information. Affected products include: Envolution Envolution.