CVE-2006-2060

high

Description

Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/26072

http://www.vupen.com/english/advisories/2006/1534

http://www.securityfocus.com/archive/1/439607/100/0/threaded

http://www.securityfocus.com/archive/1/432226/100/0/threaded

http://www.securityfocus.com/archive/1/431990/100/0/threaded

http://www.osvdb.org/25008

http://securityreason.com/securityalert/796

http://secunia.com/advisories/19830

http://forums.invisionpower.com/index.php?showtopic=213374

Details

Source: Mitre, NVD

Published: 2006-04-26

Updated: 2018-10-18

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: High