Directory traversal vulnerability in htdocs/install/index.php in XOOPS 2.0.18 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
References
Configurations
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3614 - | |
References | () http://www.securityfocus.com/archive/1/487484/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27622 - | |
References | () http://xoops.svn.sourceforge.net/viewvc/xoops/XoopsCore/branches/2.0.x/2.0.18.1/docs/changelog.txt?r1=1283&r2=1282&pathrev=1283 - Exploit | |
References | () http://xoops.svn.sourceforge.net/viewvc/xoops?view=rev&revision=1283 - Patch | |
References | () https://www.exploit-db.com/exploits/5057 - |
Information
Published : 2008-02-06 12:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0612
Mitre link : CVE-2008-0612
CVE.ORG link : CVE-2008-0612
JSON object : View
Products Affected
xoops
- xoops
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')