6.8
CVE-2006-6242
- EPSS 4.41%
- Veröffentlicht 03.12.2006 19:28:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Multiple directory traversal vulnerabilities in Serendipity 1.0.3 and earlier allow remote attackers to read or include arbitrary local files via a .. (dot dot) sequence in the serendipity[charset] parameter in (1) include/lang.inc.php; or to plugins/ scripts (2) serendipity_event_bbcode/serendipity_event_bbcode.php, (3) serendipity_event_browsercompatibility/serendipity_event_browsercompatibility.php, (4) serendipity_event_contentrewrite/serendipity_event_contentrewrite.php, (5) serendipity_event_creativecommons/serendipity_event_creativecommons.php, (6) serendipity_event_emoticate/serendipity_event_emoticate.php, (7) serendipity_event_entryproperties/serendipity_event_entryproperties.php, (8) serendipity_event_karma/serendipity_event_karma.php, (9) serendipity_event_livesearch/serendipity_event_livesearch.php, (10) serendipity_event_mailer/serendipity_event_mailer.php, (11) serendipity_event_nl2br/serendipity_event_nl2br.php, (12) serendipity_event_s9ymarkup/serendipity_event_s9ymarkup.php, (13) serendipity_event_searchhighlight/serendipity_event_searchhighlight.php, (14) serendipity_event_spamblock/serendipity_event_spamblock.php, (15) serendipity_event_spartacus/serendipity_event_spartacus.php, (16) serendipity_event_statistics/serendipity_plugin_statistics.php, (17) serendipity_event_templatechooser/serendipity_event_templatechooser.php, (18) serendipity_event_textile/serendipity_event_textile.php, (19) serendipity_event_textwiki/serendipity_event_textwiki.php, (20) serendipity_event_trackexits/serendipity_event_trackexits.php, (21) serendipity_event_weblogping/serendipity_event_weblogping.php, (22) serendipity_event_xhtmlcleanup/serendipity_event_xhtmlcleanup.php, (23) serendipity_plugin_comments/serendipity_plugin_comments.php, (24) serendipity_plugin_creativecommons/serendipity_plugin_creativecommons.php, (25) serendipity_plugin_entrylinks/serendipity_plugin_entrylinks.php, (26) serendipity_plugin_eventwrapper/serendipity_plugin_eventwrapper.php, (27) serendipity_plugin_history/serendipity_plugin_history.php, (28) serendipity_plugin_recententries/serendipity_plugin_recententries.php, (29) serendipity_plugin_remoterss/serendipity_plugin_remoterss.php, (30) serendipity_plugin_shoutbox/serendipity_plugin_shoutbox.php, and and (31) serendipity_plugin_templatedropdown/serendipity_plugin_templatedropdown.php.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
S9y ≫ Serendipity Version0.3
S9y ≫ Serendipity Version0.4
S9y ≫ Serendipity Version0.5
S9y ≫ Serendipity Version0.5_pl1
S9y ≫ Serendipity Version0.6
S9y ≫ Serendipity Version0.6_pl1
S9y ≫ Serendipity Version0.6_pl2
S9y ≫ Serendipity Version0.6_pl3
S9y ≫ Serendipity Version0.6_rc1
S9y ≫ Serendipity Version0.6_rc2
S9y ≫ Serendipity Version0.7
S9y ≫ Serendipity Version0.7.1
S9y ≫ Serendipity Version0.7_beta1
S9y ≫ Serendipity Version0.7_beta2
S9y ≫ Serendipity Version0.7_beta3
S9y ≫ Serendipity Version0.7_beta4
S9y ≫ Serendipity Version0.7_rc1
S9y ≫ Serendipity Version0.8
S9y ≫ Serendipity Version0.8.1
S9y ≫ Serendipity Version0.8.2
S9y ≫ Serendipity Version0.8_beta5
S9y ≫ Serendipity Version0.8_beta6
S9y ≫ Serendipity Version0.9.1
S9y ≫ Serendipity Version1.0.3
S9y ≫ Serendipity Version1.0_beta2
S9y ≫ Serendipity Version1.0_beta3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 4.41% | 0.886 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.