CVE-2008-2976

Multiple directory traversal vulnerabilities in TinX/cms 1.1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) language parameter to (a) include_me.php, (b) admin/ajax.php, and (c) admin/objects/catalog.ajaxhandler.php; and the (2) prefix parameter to (d) admin/inc/config.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tinx_cms:tinx_cms:1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/29907 - Exploit () http://www.securityfocus.com/bid/29907 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43305 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43305 -
References () https://www.exploit-db.com/exploits/5917 - () https://www.exploit-db.com/exploits/5917 -

Information

Published : 2008-07-02 17:14

Updated : 2024-11-21 00:48


NVD link : CVE-2008-2976

Mitre link : CVE-2008-2976

CVE.ORG link : CVE-2008-2976


JSON object : View

Products Affected

tinx_cms

  • tinx_cms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')