Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/21379 | Vendor Advisory |
http://secunia.com/advisories/23190 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2006/4809 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30619 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-12-07 17:28
Updated : 2017-07-28 18:29
NVD link : CVE-2006-6392
Mitre link : CVE-2006-6392
JSON object : View
CWE
Products Affected
plx_web_studio
- plx_pay