CVE-2005-0796

Directory traversal vulnerability in HolaCMS 1.4.9-1 allows remote attackers to overwrite arbitrary files via a "holaDB/votes" followed by a .. (dot dot) in the vote_filename parameter, which bypasses the check by HolaCMS to ensure that the file is in the holaDB/votes directory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hola:holacms:*:*:*:*:*:*:*:*
cpe:2.3:a:hola:holacms:1.4.9_1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111090966815089&w=2 - () http://marc.info/?l=bugtraq&m=111090966815089&w=2 -
References () http://secunia.com/advisories/14566 - Patch () http://secunia.com/advisories/14566 - Patch
References () http://www.holacms.de/?content=changelog - () http://www.holacms.de/?content=changelog -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0796

Mitre link : CVE-2005-0796

CVE.ORG link : CVE-2005-0796


JSON object : View

Products Affected

hola

  • holacms