Multiple directory traversal vulnerabilities in Exero CMS 1.0.0 and 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter to (1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, or (9) usercp/editpassword.php in themes/Default/. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/30711 | Vendor Advisory |
http://sourceforge.net/project/shownotes.php?release_id=607502 | |
http://www.securityfocus.com/bid/29788 | Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2008-06-24 19:41
Updated : 2024-02-28 11:21
NVD link : CVE-2008-2840
Mitre link : CVE-2008-2840
CVE.ORG link : CVE-2008-2840
JSON object : View
Products Affected
exerocms
- exero_cms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')