Vulnerability Details : CVE-2006-1201
Directory traversal vulnerability in resetpw.php in eschew.net phpBannerExchange 2.0 and earlier, and other versions before 2.0 Update 5, allows remote attackers to read arbitrary files via a .. (dot dot) in the email parameter during a "Recover password" operation (recoverpw.php).
Vulnerability category: Directory traversal
Products affected by CVE-2006-1201
- cpe:2.3:a:eschew.net:phpbannerexchange:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_3:*:*:*:*:*:*:*
- cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_4:*:*:*:*:*:*:*
- cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_1:*:*:*:*:*:*:*
- cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1201
1.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-1201
-
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0879.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25071
-
http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php
-
http://www.vupen.com/english/advisories/2006/0869
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25080
-
http://www.securityfocus.com/archive/1/426940/100/0/threaded
-
http://www.securityfocus.com/bid/16996
-
http://www.h4cky0u.org/advisories/HYSA-2006-004-phpbanner.txt
Exploit;Vendor Advisory
Jump to