語系:
http://www.nessus.org/u?9640ab6a
https://seclists.org/bugtraq/2006/Oct/209
https://www.phpbb.com/community/viewtopic.php?p=2504370&highlight=#2504370
https://www.securityfocus.com/archive/1/452012/30/0/threaded
https://www.securityfocus.com/archive/1/479997/30/0/threaded
嚴重性: Medium
ID: 21323
檔案名稱: phpbb_auction_phpbb_root_path_file_include.nasl
版本: 1.42
類型: remote
系列: CGI abuses
已發布: 2006/5/4
已更新: 2022/4/11
組態: 啟用徹底檢查
支援的感應器: Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間分數: 5.6
媒介: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE: cpe:/a:phpbb_group:phpbb-auction
必要的 KB 項目: www/phpBB
排除在外的 KB 項目: Settings/disable_cgi_scanning
可輕鬆利用: No exploit is required
弱點發布日期: 2006/5/3
CANVAS (CANVAS)
CVE: CVE-2006-2245, CVE-2006-5301, CVE-2006-5306, CVE-2006-5390, CVE-2006-5418, CVE-2006-7090, CVE-2006-7100, CVE-2006-7147, CVE-2007-5009, CVE-2007-5100
BID: 17822, 20484, 20485, 20493, 20501, 20518, 20525, 20558, 20571, 21171, 25737, 25776
CWE: 94