Vulnerability Details : CVE-2006-4140
Potential exploit
Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).
Vulnerability category: Directory traversal
Products affected by CVE-2006-4140
- cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4140
11.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4140
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-4140
-
http://securitytracker.com/id?1016676
Exploit
-
http://www.securityfocus.com/bid/19473
Exploit
-
http://secunia.com/advisories/21468
About Secunia Research | FlexeraExploit;Vendor Advisory
-
http://www.paessler.com/forum/viewtopic.php?p=4047&sid=f8c0f03a69d9498338797c6ea3cc6733
-
http://www.securityfocus.com/archive/1/444227/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/3259
-
http://www.securityfocus.com/archive/1/442822/100/0/threaded
-
http://www.paessler.com/ipcheck/history
-
http://securityreason.com/securityalert/1389
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28341
Jump to