CVE-2006-6254

N/A Unknown
Published: December 04, 2006 Modified: April 23, 2026
View on NVD

Description

administration/telecharger.php in Cahier de texte 2.0 allows remote attackers to obtain unparsed content (source code) of files via the chemin parameter, as demonstrated using directory traversal sequences to obtain the MySQL username and password from conn_cahier_de_texte.php. NOTE: it is not clear whether the scope of this issue extends above the web document root, and whether directory traversal is the primary vulnerability.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://acid-root.new.fr/poc/15061124.txt
Source: cve@mitre.org
Exploit
http://secunia.com/advisories/23122
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.securityfocus.com/bid/21283
Source: cve@mitre.org
Exploit
http://acid-root.new.fr/poc/15061124.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/23122
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://securityreason.com/securityalert/1961
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/452600/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/21283
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2006/4701
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
9.0%
93th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

cahier_de_textes