Vulnerability Details : CVE-2006-6112
Potential exploit
LifeType 1.0.x and 1.1.x have insufficient access control for all of the PHP scripts under (1) class/ and (2) plugins/, which allows remote attackers to obtain the installation path via a direct request to any of the scripts, as demonstrated by (a) bayesianfilter.class.php and (b) bootstrap.php, which leaks the path in an error message.
Products affected by CVE-2006-6112
- cpe:2.3:a:lifetype:lifetype:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:lifetype:lifetype:1.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6112
0.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6112
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-6112
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30635
-
http://www.netvigilance.com/advisory0008
Exploit;Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/453135/100/0/threaded
-
http://www.lifetype.net/blog.php/lifetype-development-journal/2006/11/30/full_path_disclosure_vulnerability_in_lifetype_1.0.x_and_1.1.x
Patch;Vendor Advisory
-
http://securityreason.com/securityalert/1980
-
http://www.osvdb.org/30685
Vendor Advisory
Jump to