plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29724 - Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=595725 - | |
References | () http://www.osvdb.org/50229 - | |
References | () http://www.securityfocus.com/bid/28654 - | |
References | () http://www.vupen.com/english/advisories/2008/1136 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41676 - | |
References | () https://www.exploit-db.com/exploits/5392 - |
Information
Published : 2008-04-16 19:05
Updated : 2024-11-21 00:45
NVD link : CVE-2008-1856
Mitre link : CVE-2008-1856
CVE.ORG link : CVE-2008-1856
JSON object : View
Products Affected
linpha
- linpha