Directory traversal vulnerability in help_text_vars.php in PHPGedView 3.3.7 and earlier allows remote attackers to read and include arbitrary files via a .. (dot dot) in the PGV_BASE_DIRECTORY parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.sourceforge.net/viewcvs.py/phpgedview/phpGedView/help_text_vars.php?r1=1.63&r2=1.64 - | |
References | () http://rgod.altervista.org/phpgedview_337_xpl.html - | |
References | () http://secunia.com/advisories/18177 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1015395 - | |
References | () http://www.osvdb.org/22009 - | |
References | () http://www.securityfocus.com/archive/1/419906/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/15983 - Exploit | |
References | () http://www.vupen.com/english/advisories/2005/3033 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23871 - | |
References | () https://sourceforge.net/tracker/index.php?func=detail&aid=1386434&group_id=55456&atid=477081 - Patch |
Information
Published : 2005-12-22 00:03
Updated : 2024-11-21 00:04
NVD link : CVE-2005-4467
Mitre link : CVE-2005-4467
CVE.ORG link : CVE-2005-4467
JSON object : View
Products Affected
phpgedview
- phpgedview
CWE