Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/26072 | vdb entry |
http://www.securityfocus.com/archive/1/432226/100/0/threaded | mailing list |
http://securityreason.com/securityalert/796 | third party advisory |
http://secunia.com/advisories/19830 | third party advisory |
http://www.osvdb.org/25008 | vdb entry |
http://www.vupen.com/english/advisories/2006/1534 | vdb entry |
http://www.securityfocus.com/archive/1/431990/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/439607/100/0/threaded | mailing list |
http://forums.invisionpower.com/index.php?showtopic=213374 | patch |