Directory traversal vulnerability in main.php in PCPIN Chat 5.0.4 and earlier allows remote authenticated users to include and execute arbitrary PHP code via a ".." (dot dot) in a language cookie, as demonstrated by uploading then accessing a smiliefile image that actually contains PHP code.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/436029/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/1441 | vdb entry |
http://securitytracker.com/id?1015968 | vdb entry |
http://www.securityfocus.com/archive/1/431390/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/17632 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25962 | vdb entry |
http://retrogod.altervista.org/pcpin_504_xpl.html | exploit |
http://secunia.com/advisories/19708 | third party advisory vendor advisory |