Vulnerability Details : CVE-2005-4600
Directory traversal vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to read or include arbitrary files via a trailing null byte (%00) in the (1) theme, (2) language, (3) plugins, or (4) lang parameter.
Vulnerability category: Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2005-4600
Probability of exploitation activity in the next 30 days: 0.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-4600
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2005-4600
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-4600
- http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2244
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/36736
- https://www.exploit-db.com/exploits/4441
-
http://www.hardened-php.net/advisory_262005.111.html
Vendor Advisory
- http://tinymce.moxiecode.com/punbb/viewtopic.php?id=2233
- http://www.securityfocus.com/archive/1/420543/100/0/threaded
- http://securitytracker.com/id?1015424
- http://www.securityfocus.com/bid/16083
-
http://securityreason.com/securityalert/306
Products affected by CVE-2005-4600
- cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*