Directory traversal vulnerability in common.php in CMScout 2.05, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bit parameter, as demonstrated by an upload to avatar/ of a .jpg file containing PHP sequences.
References
Configurations
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31243 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/4093 - | |
References | () http://www.cmscout.co.za/index.php?page=news&id=29 - | |
References | () http://www.securityfocus.com/bid/30385 - | |
References | () http://www.vupen.com/english/advisories/2008/2218/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44017 - | |
References | () https://www.exploit-db.com/exploits/6142 - |
Information
Published : 2008-07-31 17:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3415
Mitre link : CVE-2008-3415
CVE.ORG link : CVE-2008-3415
JSON object : View
Products Affected
cmscout
- cmscout
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')