Vulnerability Details : CVE-2006-4004
Potential exploit
Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
Vulnerability category: Directory traversal
Products affected by CVE-2006-4004
- cpe:2.3:a:vbportal:vbportal:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vbportal:vbportal:3.5.0_beta_2:*:*:*:*:*:*:*
- cpe:2.3:a:vbportal:vbportal:3.5.0_beta_3:*:*:*:*:*:*:*
- cpe:2.3:a:vbportal:vbportal:3.5.0_gold:*:*:*:*:*:*:*
- cpe:2.3:a:vbportal:vbportal:3.6.0_beta_1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4004
9.01%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4004
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
References for CVE-2006-4004
-
http://www.phpportals.com/forums/showthread.php?t=17308
-
https://www.exploit-db.com/exploits/2087
-
http://secunia.com/advisories/21287
Exploit;Vendor Advisory
-
http://www.securityfocus.com/bid/19257
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28077
-
http://www.vupen.com/english/advisories/2006/3102
Jump to