Vulnerability Details : CVE-2006-4191
Potential exploit
Directory traversal vulnerability in memcp.php in XMB (Extreme Message Board) 1.9.6 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the langfilenew parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by header.php.
Vulnerability category: Directory traversal
Products affected by CVE-2006-4191
- cpe:2.3:a:xmb_software:extreme_message_board:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4191
10.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
Vendor statements for CVE-2006-4191
-
XMB 2021-04-23XMB versions 1.9.8 and later were checked and are not vulnerable. Upgrades are available at https://www.xmbforum2.com/
References for CVE-2006-4191
-
http://www.securityfocus.com/archive/1/443167/100/0/threaded
-
http://www.securityfocus.com/bid/19494
-
http://secunia.com/advisories/21293
About Secunia Research | FlexeraExploit;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28356
-
http://retrogod.altervista.org/xmb_196_sql.html
Error 404 :(Exploit
-
https://docs.xmbforum2.com/index.php?title=Security_Issue_History
Security Issue History - XMBdocs
-
http://www.securityfocus.com/bid/19501
Exploit
-
https://www.exploit-db.com/exploits/2178
-
http://securityreason.com/securityalert/1411
Jump to