First published: Thu Aug 17 2006(Updated: )
Directory traversal vulnerability in Zen Cart 1.3.0.2 and earlier allows remote attackers to include and possibly execute arbitrary local files via directory traversal sequences in the typefilter parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zen Cart | =1.2.0d | |
Zen Cart | =1.2.1_patch1 | |
Zen Cart | =1.2.1d | |
Zen Cart | =1.2.2d | |
Zen Cart | =1.2.3d | |
Zen Cart | =1.2.4.1 | |
Zen Cart | =1.2.4d | |
Zen Cart | =1.2.5d | |
Zen Cart | =1.2.6d | |
Zen Cart | =1.3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4218 is rated as a medium severity vulnerability.
To fix CVE-2006-4218, users should upgrade to Zen Cart version 1.3.0.3 or later.
CVE-2006-4218 affects Zen Cart versions 1.3.0.2 and earlier as well as several earlier versions.
Exploitation of CVE-2006-4218 can allow remote attackers to execute arbitrary local files on the server.
Yes, CVE-2006-4218 is a directory traversal vulnerability that allows unauthorized access to file system paths.