Description
Directory traversal vulnerability in the "remember me" feature in liveuser.php in PHP Extension and Application Repository (PEAR) LiveUser 0.16.8 and earlier allows remote attackers to determine file existence, and possibly delete arbitrary files with short pathnames or possibly read arbitrary files, via a .. (dot dot) in the store_id value of a cookie.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- partial
- Integrity
- partial
- Availability
- none
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- PEAR
- Published
- 2/23/2006
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
pear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuserpear : pear_liveuser
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.