Vulnerability Description
Directory traversal vulnerability in downloaddetails.php in TorrentFlux 2.2 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the alias parameter, a different vector than CVE-2006-6328.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Torrentflux | Torrentflux | 2.2 |
References
- http://secunia.com/advisories/23270
- http://www.securityfocus.com/bid/21525
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30831
- https://www.exploit-db.com/exploits/2902
- http://secunia.com/advisories/23270
- http://www.securityfocus.com/bid/21525
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30831
- https://www.exploit-db.com/exploits/2902
FAQ
What is CVE-2006-6604?
CVE-2006-6604 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Directory traversal vulnerability in downloaddetails.php in TorrentFlux 2.2 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the alias parameter, a different vec...
How severe is CVE-2006-6604?
CVE-2006-6604 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6604?
Check the references section above for vendor advisories and patch information. Affected products include: Torrentflux Torrentflux.