CVE-2006-0625

Spip - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

Exploits (1)

exploitdb WORKING POC VERIFIED
by rgod · textwebappsphp
https://www.exploit-db.com/exploits/27172

References (7)

Core 7
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/16556
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0483
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/23086
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/24600
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/18676
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015602

Scores

EPSS 0.0968
EPSS Percentile 92.9%

Details

Status published
Products (3)
spip/spip 1.8.2d
spip/spip 1.8.2e
spip/spip 1.8.2g
Published Feb 09, 2006
Tracked Since Feb 18, 2026