CVE-2006-3274 (GCVE-0-2006-3274)

Vulnerability from cvelistv5 – Published: 2006-06-28 22:00 – Updated: 2024-08-07 18:23
VLAI?
Summary
Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \ (backslash) characters in the URL to certain directories under the web root, such as the image directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/438149/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.webmin.com/changes.html x_refsource_CONFIRM
http://securityreason.com/securityalert/1161 third-party-advisoryx_refsource_SREASON
http://securitytracker.com/id?1016375 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/20777 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2493 vdb-entryx_refsource_VUPEN
http://jvn.jp/jp/JVN%2367974490/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/18613 vdb-entryx_refsource_BID
http://www.lac.co.jp/business/sns/intelligence/SN… x_refsource_MISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:23:21.196Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060623 [SNS Advisory No.88] Webmin Directory Traversal Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438149/100/0/threaded"
          },
          {
            "name": "webmin-backslash-directory-traversal(27366)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27366"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.webmin.com/changes.html"
          },
          {
            "name": "1161",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/1161"
          },
          {
            "name": "1016375",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016375"
          },
          {
            "name": "20777",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20777"
          },
          {
            "name": "ADV-2006-2493",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2493"
          },
          {
            "name": "JVN#67974490",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/jp/JVN%2367974490/index.html"
          },
          {
            "name": "18613",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18613"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \\ (backslash) characters in the URL to certain directories under the web root, such as the image directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060623 [SNS Advisory No.88] Webmin Directory Traversal Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438149/100/0/threaded"
        },
        {
          "name": "webmin-backslash-directory-traversal(27366)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27366"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.webmin.com/changes.html"
        },
        {
          "name": "1161",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/1161"
        },
        {
          "name": "1016375",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016375"
        },
        {
          "name": "20777",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20777"
        },
        {
          "name": "ADV-2006-2493",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2493"
        },
        {
          "name": "JVN#67974490",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/jp/JVN%2367974490/index.html"
        },
        {
          "name": "18613",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18613"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3274",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \\ (backslash) characters in the URL to certain directories under the web root, such as the image directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060623 [SNS Advisory No.88] Webmin Directory Traversal Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438149/100/0/threaded"
            },
            {
              "name": "webmin-backslash-directory-traversal(27366)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27366"
            },
            {
              "name": "http://www.webmin.com/changes.html",
              "refsource": "CONFIRM",
              "url": "http://www.webmin.com/changes.html"
            },
            {
              "name": "1161",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/1161"
            },
            {
              "name": "1016375",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016375"
            },
            {
              "name": "20777",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20777"
            },
            {
              "name": "ADV-2006-2493",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2493"
            },
            {
              "name": "JVN#67974490",
              "refsource": "JVN",
              "url": "http://jvn.jp/jp/JVN%2367974490/index.html"
            },
            {
              "name": "18613",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18613"
            },
            {
              "name": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html",
              "refsource": "MISC",
              "url": "http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3274",
    "datePublished": "2006-06-28T22:00:00",
    "dateReserved": "2006-06-28T00:00:00",
    "dateUpdated": "2024-08-07T18:23:21.196Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.2.70\", \"matchCriteriaId\": \"72A55881-A6A1-47F7-BEE5-E27981B2FE36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD941A62-A41E-41CB-80C0-8B780AC39FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"786287DD-2565-4931-BBA0-2CACD7671352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4784DC04-D2C5-46C6-831F-23D69B4B0513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C219DAB-C13C-4232-8B98-2D7A9ED16E30\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \\\\ (backslash) characters in the URL to certain directories under the web root, such as the image directory.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de salto de directorio en versiones de Webmin anteriores a la v1.280, cuando se ejecuta en Windows, permite a atacantes remotos leer ficheros arbitrarios a trav\\u00e9s del car\\u00e1cter \\\\ (barra invertida) en la URL a determinados directorios bajo la ra\\u00edz Web, tales como el directorio de imagenes.\"}]",
      "evaluatorSolution": "Update to version 1.280.",
      "id": "CVE-2006-3274",
      "lastModified": "2024-11-21T00:13:13.753",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2006-06-28T22:05:00.000",
      "references": "[{\"url\": \"http://jvn.jp/jp/JVN%2367974490/index.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/20777\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/1161\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1016375\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438149/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/18613\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2493\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.webmin.com/changes.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27366\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvn.jp/jp/JVN%2367974490/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/20777\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/1161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1016375\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/438149/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/18613\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/2493\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.webmin.com/changes.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/27366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2006-3274\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-06-28T22:05:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in Webmin before 1.280, when run on Windows, allows remote attackers to read arbitrary files via \\\\ (backslash) characters in the URL to certain directories under the web root, such as the image directory.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en versiones de Webmin anteriores a la v1.280, cuando se ejecuta en Windows, permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s del car\u00e1cter \\\\ (barra invertida) en la URL a determinados directorios bajo la ra\u00edz Web, tales como el directorio de imagenes.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webmin:webmin:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.70\",\"matchCriteriaId\":\"72A55881-A6A1-47F7-BEE5-E27981B2FE36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webmin:webmin:1.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD941A62-A41E-41CB-80C0-8B780AC39FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webmin:webmin:1.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786287DD-2565-4931-BBA0-2CACD7671352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webmin:webmin:1.2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4784DC04-D2C5-46C6-831F-23D69B4B0513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webmin:webmin:1.2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C219DAB-C13C-4232-8B98-2D7A9ED16E30\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/jp/JVN%2367974490/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20777\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/1161\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1016375\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/438149/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/18613\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2493\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.webmin.com/changes.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27366\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/jp/JVN%2367974490/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/20777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/1161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1016375\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.lac.co.jp/business/sns/intelligence/SNSadvisory_e/88_e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/438149/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/18613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/2493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.webmin.com/changes.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/27366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Update to version 1.280.\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…