Vulnerability Details : CVE-2006-0644
Potential exploit
Multiple directory traversal vulnerabilities in install.php in CPG-Nuke Dragonfly CMS (aka CPG Dragonfly CMS) 9.0.6.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences and a NUL (%00) character in (1) the newlang parameter and (2) the installlang parameter in a cookie, as demonstrated by using error.php to insert malicious code into a log file, or uploading a malicious .png file, which is then included using install.php.
Vulnerability category: Directory traversal
Products affected by CVE-2006-0644
- cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.6_.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0644
10.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0644
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-0644
-
http://retrogod.altervista.org/dragonfly9.0.6.1_incl_xpl.html
Error 404 :(Exploit
-
http://dragonflycms.org/Forums/viewtopic/p=98034.html#98034
-
http://www.securityfocus.com/bid/16546
Exploit
-
http://www.securityfocus.com/archive/1/424439/100/0/threaded
-
http://www.osvdb.org/23058
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24660
-
http://securitytracker.com/id?1015601
-
http://dragonflycms.org/Forums/viewtopic/p=98034.html
Jump to