First published: Mon Sep 25 2006(Updated: )
MyBB (aka MyBulletinBoard) allows remote attackers to obtain sensitive information via a direct request for inc/plugins/hello.php, which reveals the path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mybulletinboard | =1.10 | |
Mybulletinboard | =1.14 | |
Mybulletinboard | =1.0_final | |
Mybulletinboard | =1.1.1 | |
Mybulletinboard | =1.1.3 | |
Mybulletinboard | =1.20 | |
Mybulletinboard | =1.0.3 | |
Mybulletinboard | =1.1.5 | |
Mybulletinboard | =1.1 | |
Mybulletinboard | =1.1.4 | |
Mybulletinboard | =1.0.1 | |
Mybulletinboard | =1.0.4 | |
Mybulletinboard | =1.1.2 | |
Mybulletinboard | =1.0.2 | |
Mybulletinboard | =1.0_rc2 | |
Mybulletinboard | =1.1.7 | |
Mybulletinboard | =1.0_preview_release_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4971 is classified as a moderate severity vulnerability due to its potential to disclose sensitive information.
To fix CVE-2006-4971, you should upgrade your MyBB installation to the latest version that addresses this vulnerability.
CVE-2006-4971 affects multiple versions of MyBB including 1.0_final, 1.1.1, 1.1.3, 1.10, 1.14, and others up to 1.20.
Yes, exploitation of CVE-2006-4971 can lead to unauthorized access to sensitive data, which could facilitate further attacks.
CVE-2006-4971 discloses the file path in an error message, revealing sensitive information about the server's directory structure.