CVE-2006-4140 (CNNVD-200608-239)
MEDIUM
有利用代码
中文标题:
IPCheck Server Monitor 畸形的".."(两点)序列目录遍历漏洞
英文标题:
Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attac...
CVSS分数:
5.0
发布时间:
2006-08-14 23:00:00
漏洞类型:
路径遍历
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v4
漏洞描述
中文描述:
IPCheck Server Monitor 5.3.3.639/640之前的版本存在目录遍历漏洞,远程攻击者可借助URL中畸形的".."(两点)序列,包括:(1) "..%2f" (编码"/"斜杠), "..../" (多个点),和"..%255c../" (双重编码"\"反斜杠),来读取任意文件。
英文描述:
Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).
CWE类型:
(暂无数据)
标签:
remote
windows
Tassi Raeburn
OSVDB-27912
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| ipcheck | server_monitor | 4.3.1.368 | - | - |
cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 4.3.1.382 | - | - |
cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 4.4.1.521 | - | - |
cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 4.4.1.522 | - | - |
cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.0.1.272 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.0.1.299 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.0.1.309 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.0.1.321 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.1.0.341 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.1.0.342 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.1.0.345 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.0.404 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.0.405 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.0.418 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.0.420 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.2.449 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.2.2.451 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.0.506 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.0.507 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.0.508 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.0.509 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.574 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.575 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.578 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.579 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.580 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.581 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.586 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.1.587 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.605 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.606 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.609 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.610 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.616 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*
|
| ipcheck | server_monitor | 5.3.2.617 | - | - |
cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20060824 Re: Directory Traversal vulnerability in IPCheck Monitor Server
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
1389
third-party-advisory
cve.org
访问
cve.org
21468
third-party-advisory
cve.org
访问
cve.org
19473
vdb-entry
cve.org
访问
cve.org
20060810 Directory Traversal vulnerability in IPCheck Monitor Server
mailing-list
cve.org
访问
cve.org
ipcheck-url-directory-traversal(28341)
vdb-entry
cve.org
访问
cve.org
1016676
vdb-entry
cve.org
访问
cve.org
ADV-2006-3259
vdb-entry
cve.org
访问
cve.org
ExploitDB EDB-28374
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-28374
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2006-4140
ADVISORY
cve.org
访问
cve.org
CVSS评分详情
5.0
MEDIUM
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS版本:
2.0
机密性
PARTIAL
完整性
NONE
可用性
NONE
时间信息
发布时间:
2006-08-14 23:00:00
修改时间:
2024-08-07 18:57:46
创建时间:
2025-11-11 15:32:36
更新时间:
2026-01-26 02:17:06
利用信息
此漏洞有可利用代码!
利用代码数量:
1
利用来源:
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-4140 |
2025-11-11 15:17:44 | 2025-11-11 07:32:36 |
| NVD | nvd_CVE-2006-4140 |
2025-11-11 14:51:50 | 2025-11-11 07:41:21 |
| CNNVD | cnnvd_CNNVD-200608-239 |
2025-11-11 15:08:52 | 2025-11-11 07:49:09 |
| EXPLOITDB | exploitdb_EDB-28374 |
2025-11-11 15:05:56 | 2025-11-11 08:24:09 |
版本与语言
当前版本:
v4
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4
EXPLOITDB
2025-11-11 16:24:09
references_count: 10 → 13; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 10 -> 13
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:49:09
vulnerability_type: 未提取 → 路径遍历; cnnvd_id: 未提取 → CNNVD-200608-239; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-200608-239
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:21
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:N/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 35; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 35
- data_sources: ['cve'] -> ['cve', 'nvd']