Directory traversal vulnerability in HolaCMS 1.4.9-1 allows remote attackers to overwrite arbitrary files via a "holaDB/votes" followed by a .. (dot dot) in the vote_filename parameter, which bypasses the check by HolaCMS to ensure that the file is in the holaDB/votes directory.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111090966815089&w=2 - | |
References | () http://secunia.com/advisories/14566 - Patch | |
References | () http://www.holacms.de/?content=changelog - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0796
Mitre link : CVE-2005-0796
CVE.ORG link : CVE-2005-0796
JSON object : View
Products Affected
hola
- holacms
CWE