CVE-2006-7133

N/A Unknown
Published: March 06, 2007 Modified: April 23, 2026
View on NVD

Description

Directory traversal vulnerability in upload/bin/download.php in Upload Tool for PHP 1.0 allows remote attackers to read arbitrary files via (1) ".." sequences or (2) absolute pathnames in the filename parameter.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.craigheffner.com/security/exploits/upload_tool_php.txt
Source: cve@mitre.org
Exploit URL Repurposed
http://secunia.com/advisories/22973
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.craigheffner.com/security/exploits/upload_tool_php.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit URL Repurposed
http://www.securityfocus.com/bid/21150
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4575
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30322
Source: af854a3a-2127-422b-91ae-364da2661108

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.9%
88th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

php_upload_tool