First published: Mon Nov 06 2006(Updated: )
Directory traversal vulnerability in error.php in PostNuke 0.763 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PNSVlang (PNSV lang) cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by error.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Postnuke Software Foundation Pnphpbb | =0.762 | |
Postnuke Software Foundation Pnphpbb | <=0.763 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5733 has been classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2006-5733, upgrade to PostNuke version 0.764 or later, which addresses the directory traversal vulnerability.
CVE-2006-5733 affects PostNuke versions 0.763 and earlier.
CVE-2006-5733 enables attackers to perform directory traversal attacks leading to the inclusion and execution of arbitrary local files.
Yes, CVE-2006-5733 allows remote attackers to execute arbitrary code on the affected PostNuke installation.