Vulnerability Description
Directory traversal vulnerability in includes/search/search_mdforum.php in MAXdev MDForum 2.0.1 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang cookie to error.php, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Maxdev | Mdforum | <= 2.0.1 |
References
- http://www.securityfocus.com/bid/21837Exploit
- http://www.vupen.com/english/advisories/2007/0017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31215
- https://www.exploit-db.com/exploits/3057
- http://www.securityfocus.com/bid/21837Exploit
- http://www.vupen.com/english/advisories/2007/0017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31215
- https://www.exploit-db.com/exploits/3057
FAQ
What is CVE-2006-6869?
CVE-2006-6869 is a vulnerability with a CVSS score of 9.3 (HIGH). Directory traversal vulnerability in includes/search/search_mdforum.php in MAXdev MDForum 2.0.1 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers ...
How severe is CVE-2006-6869?
CVE-2006-6869 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6869?
Check the references section above for vendor advisories and patch information. Affected products include: Maxdev Mdforum.