First published: Tue Dec 13 2005(Updated: )
Directory traversal vulnerability in Flatnuke 2.5.6 allows remote attackers to access arbitrary files via a .. (dot dot) and null byte (%00) in the id parameter of the read module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =2.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4208 is classified as a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2005-4208, upgrade to a secure version of Flatnuke that is not affected by the directory traversal vulnerability.
CVE-2005-4208 can be exploited by attackers to perform directory traversal attacks, allowing them to access sensitive files on the server.
Yes, there are known exploits for CVE-2005-4208 that demonstrate how to utilize the vulnerability to access arbitrary files.
CVE-2005-4208 specifically affects Flatnuke version 2.5.6.