Loading
Generated remediation guidance and an executive summary. No account required.
Directory traversal vulnerability in index.php in Coppermine 1.4.4 allows remote attackers to read arbitrary files via a .//./ (modified dot dot slash) in the file parameter, which causes a regular expression to collapse the sequences into standard "../" sequences.
Use Coppermine vendor hub and Coppermine Photo Gallery product page to widen CVE-2006-1909 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2007-1414, CVE-2007-4283 and CVE-2007-3558 for nearby disclosures in the same product family.