Website META Language (WML) 2.0.11 allows local users to overwrite arbitrary files via a symlink attack on (1) the /tmp/pe.tmp.$$ temporary file used by wml_contrib/wmg.cgi and (2) temporary files used by wml_backend/p3_eperl/eperl_sys.c.
References
Configurations
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=463907 - Exploit | |
References | () http://secunia.com/advisories/28829 - | |
References | () http://secunia.com/advisories/28856 - Vendor Advisory | |
References | () http://secunia.com/advisories/29353 - | |
References | () http://security.gentoo.org/glsa/glsa-200803-23.xml - | |
References | () http://www.debian.org/security/2008/dsa-1492 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:076 - | |
References | () http://www.securityfocus.com/bid/27685 - |
Information
Published : 2008-02-11 21:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0666
Mitre link : CVE-2008-0666
CVE.ORG link : CVE-2008-0666
JSON object : View
Products Affected
website_meta_language
- website_meta_language
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')