First published: Wed Dec 06 2006(Updated: )
Directory traversal vulnerability in index.php for TorrentFlux 2.2 allows remote attackers to create or overwrite arbitrary files via sequences in the alias_file parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TorrentFlux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6328 is classified as a high severity vulnerability due to its potential impact on file system integrity.
To fix CVE-2006-6328, upgrade to a patched version of TorrentFlux that addresses this directory traversal vulnerability.
CVE-2006-6328 allows attackers to create or overwrite arbitrary files on the server via manipulation of the alias_file parameter.
TorrentFlux version 2.2 is the only affected version for CVE-2006-6328.
You can determine if your system is vulnerable to CVE-2006-6328 by checking if you are using TorrentFlux version 2.2 and inspecting configuration settings related to file handling.