First published: Fri Dec 15 2006(Updated: )
Directory traversal vulnerability in downloaddetails.php in TorrentFlux 2.2 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the alias parameter, a different vector than CVE-2006-6328.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TorrentFlux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6604 has a moderate severity rating due to its potential for unauthorized file access.
To fix CVE-2006-6604, you should upgrade to a patched version of TorrentFlux or implement proper input validation to sanitize the alias parameter.
CVE-2006-6604 affects users of TorrentFlux version 2.2 with remote authenticated access.
CVE-2006-6604 is categorized as a directory traversal vulnerability.
Yes, CVE-2006-6604 can be exploited remotely by authenticated users to read arbitrary files on the server.