Vulnerability Name: | CVE-2006-0347 (CCN-24224) | ||||||||
Assigned: | 2006-01-19 | ||||||||
Published: | 2006-01-19 | ||||||||
Updated: | 2017-07-20 | ||||||||
Summary: | Directory traversal vulnerability in ELOG before 2.6.1 allows remote attackers to access arbitrary files outside of the elog directory via "../" (dot dot) sequences in the URL. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2006-0347 Source: CCN Type: ELOG download page ELOG download page Source: CCN Type: ELOG ChangeLog Version 2.6.1, released Jan 19th, 2005 Source: MISC Type: UNKNOWN http://midas.psi.ch/elog/download/ChangeLog Source: CCN Type: SA18533 ELOG Multiple Security Issue and Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 18533 Source: SECUNIA Type: UNKNOWN 18783 Source: DEBIAN Type: UNKNOWN DSA-967 Source: DEBIAN Type: DSA-967 elog -- several vulnerabilities Source: OSVDB Type: UNKNOWN 22647 Source: CCN Type: OSVDB ID: 22647 ELOG URL Processing Unspecified Traversal Source: BID Type: Patch 16315 Source: CCN Type: BID-16315 ELOG Web Logbook Multiple Remote Input Validation Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2006-0262 Source: XF Type: UNKNOWN elog-dotdot-directory-traversal(24224) Source: XF Type: UNKNOWN elog-dotdot-directory-traversal(24224) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |