Executive Summary

Informations
Name CVE-2006-1224 First vendor Publication 2006-03-14
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in dwnld.php in GuppY 4.5.11 allows remote attackers to overwrite arbitrary files via a "%2E." (mixed encoding) in the pg parameter.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1224

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11

Open Source Vulnerability Database (OSVDB)

Id Description
23993 GuppY Crafted Traversal Filter Bypass

GuppY contains a flaw that allows a remote attacker to access files outside of the web path. The issue is due to the dwnld.php not properly sanitizing user input, specifically directory traversal style attacks are possible by using a mixed encoding (%2E./%2E./) supplied via the 'pg' variable.
23846 GuppY dwnld.php pg Variable Arbitrary File Overwrite

Guppy contains a flaw that may allow a remote denial of service. The issue is caused by the improper sanitization of the 'pg' variable in dwnld.php before being used to write a counter value to '.dtb' files. An attacker can overwrite any file with permissions set to 666 via null injection resulting in a loss of availability for the service.

Sources (Detail)

http://secunia.com/advisories/19222
http://securityreason.com/securityalert/569
http://securitytracker.com/id?1015753
http://www.freeguppy.org/?lng=en
http://www.kapda.ir/advisory-291.html
http://www.osvdb.org/23846
http://www.osvdb.org/23993
http://www.securityfocus.com/archive/1/427329/100/0/threaded
http://www.securityfocus.com/bid/17068
http://www.vupen.com/english/advisories/2006/0936
https://exchange.xforce.ibmcloud.com/vulnerabilities/25141
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:20:55
  • Multiple Updates
2024-11-28 12:08:29
  • Multiple Updates
2021-05-04 12:03:47
  • Multiple Updates
2021-04-22 01:04:21
  • Multiple Updates
2020-05-23 00:17:31
  • Multiple Updates
2018-10-18 21:20:01
  • Multiple Updates
2017-07-20 09:23:25
  • Multiple Updates
2016-06-28 15:40:04
  • Multiple Updates
2016-04-26 14:24:10
  • Multiple Updates
2013-05-11 10:51:30
  • Multiple Updates