Multiple directory traversal vulnerabilities in TinX/cms 1.1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) language parameter to (a) include_me.php, (b) admin/ajax.php, and (c) admin/objects/catalog.ajaxhandler.php; and the (2) prefix parameter to (d) admin/inc/config.php.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/29907 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43305 - | |
References | () https://www.exploit-db.com/exploits/5917 - |
Information
Published : 2008-07-02 17:14
Updated : 2024-11-21 00:48
NVD link : CVE-2008-2976
Mitre link : CVE-2008-2976
CVE.ORG link : CVE-2008-2976
JSON object : View
Products Affected
tinx_cms
- tinx_cms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')