Directory traversal vulnerability in install/help.php in TalkBack 2.3.5, and other versions before 2.3.6.2, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the language parameter.
References
Configurations
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4067 - | |
References | () http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt - | |
References | () http://www.scripts.oldguy.us/talkback/release-notes.html - | |
References | () http://www.securityfocus.com/bid/30393 - Exploit | |
References | () http://www.vupen.com/english/advisories/2008/2211/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44018 - | |
References | () https://www.exploit-db.com/exploits/6148 - | |
References | () https://www.exploit-db.com/exploits/6451 - | |
References | () https://www.exploit-db.com/exploits/9095 - |
Information
Published : 2008-07-30 17:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3371
Mitre link : CVE-2008-3371
CVE.ORG link : CVE-2008-3371
JSON object : View
Products Affected
talkback
- talkback
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')