First published: Wed Apr 30 2014(Updated: )
Multiple directory traversal vulnerabilities in PHP-Fusion before 7.02.06 allow remote authenticated users to include and execute arbitrary files via a .. (dot dot) in the (1) user_theme parameter to maincore.php; or remote authenticated administrators to delete arbitrary files via the (2) enable parameter to administration/user_fields.php or (3) file parameter to administration/db_backup.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=7.02.05 | |
Jenkins | =7.02.01 | |
Jenkins | =7.02.02 | |
Jenkins | =7.02.03 | |
Jenkins | =7.02.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1806 is classified with a moderate severity level due to its potential impact on file inclusion and deletion.
To fix CVE-2013-1806, you should upgrade PHP-Fusion to version 7.02.06 or later, which addresses these vulnerabilities.
Due to CVE-2013-1806, attackers can perform directory traversal leading to unauthorized file inclusion or execution.
CVE-2013-1806 affects all remote authenticated users and administrators of PHP-Fusion versions prior to 7.02.06.
Yes, CVE-2013-1806 specifically affects PHP-Fusion versions 7.02.05 and earlier, including 7.02.01 through 7.02.04.