Directory traversal vulnerability in resetpw.php in eschew.net phpBannerExchange 2.0 and earlier, and other versions before 2.0 Update 5, allows remote attackers to read arbitrary files via a .. (dot dot) in the email parameter during a "Recover password" operation (recoverpw.php).
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Directory traversal vulnerability in resetpw.php in eschew.net phpBannerExchange 2.0 and earlier, and other versions before 2.0 Update 5, allows remote attackers to read arbitrary files via a .. (dot dot) in the email parameter during a "Recover password" operation (recoverpw.php).
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/19127 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/archive/1/426940/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| http://www.vupen.com/english/advisories/2006/0869 | vdb-entry x_refsource_VUPEN |
| http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php | x_refsource_CONFIRM |
| http://www.osvdb.org/23720 | vdb-entry x_refsource_OSVDB |
| http://www.h4cky0u.org/advisories/HYSA-2006-004-phpbanner.txt | x_refsource_MISC |
| http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0879.html | mailing-list x_refsource_FULLDISC |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25071 | vdb-entry x_refsource_XF |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25080 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/16996 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/19127 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.securityfocus.com/archive/1/426940/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://www.vupen.com/english/advisories/2006/0869 | vdb-entry x_refsource_VUPEN x_transferred |
| http://www.eschew.net/scripts/phpbe/2.0/releasenotes.php | x_refsource_CONFIRM x_transferred |
| http://www.osvdb.org/23720 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.h4cky0u.org/advisories/HYSA-2006-004-phpbanner.txt | x_refsource_MISC x_transferred |
| http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0879.html | mailing-list x_refsource_FULLDISC x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25071 | vdb-entry x_refsource_XF x_transferred |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/25080 | vdb-entry x_refsource_XF x_transferred |
| http://www.securityfocus.com/bid/16996 | vdb-entry x_refsource_BID x_transferred |
Directory traversal vulnerability in resetpw.php in eschew.net phpBannerExchange 2.0 and earlier, and other versions before 2.0 Update 5, allows remote attackers to read arbitrary files via a .. (dot dot) in the email parameter during a "Recover password" operation (recoverpw.php).
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |