Directory traversal vulnerability in newpost.php in Ultimate PHP Board (UPB) 1.9.6 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence and trailing null (%00) byte in the id parameter, as demonstrated by injecting a Perl CGI script using "[NR]" sequences in the message parameter, then calling close.php with modified id and t_id parameters to chmod the script. NOTE: this issue might be resultant from dynamic variable evaluation.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T18:23:20.116Z
Reserved: 2006-06-23T00:00:00
Link: CVE-2006-3207

No data.

Status : Modified
Published: 2006-06-24T01:06:00.000
Modified: 2024-11-21T00:13:04.330
Link: CVE-2006-3207

No data.