CVE-2008-3555

Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wsn:forum:*:*:*:*:*:*:*:*
cpe:2.3:a:wsn:gallery:*:*:*:*:*:*:*:*
cpe:2.3:a:wsn:knowledge_base:*:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.12:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.13:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.14:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.15:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.16:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.17:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.18:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.19:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.20:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.21:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.22:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.23:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.24:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.25:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.26:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.27:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.28:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.29:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.30:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.31:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.32:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.33:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.34:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.35:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.36:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.37:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.38:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.39:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.40:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.0.41:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.12:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.13:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.14:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.16:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.17:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.18:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.19:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.20:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.21:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.22:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.23:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.24:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.25:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.26:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.27:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.28:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.29:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.30:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.31:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.32:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.33:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.34:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.35:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.36:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.37:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.38:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.39:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.40:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.41:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.42:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.43:*:*:*:*:*:*:*
cpe:2.3:a:wsn:links:4.1.44:*:*:*:*:*:*:*

History

21 Nov 2024, 00:49

Type Values Removed Values Added
References () http://secunia.com/advisories/31392 - () http://secunia.com/advisories/31392 -
References () http://securityreason.com/securityalert/4120 - () http://securityreason.com/securityalert/4120 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44236 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44236 -
References () https://www.exploit-db.com/exploits/6208 - () https://www.exploit-db.com/exploits/6208 -

Information

Published : 2008-08-08 19:41

Updated : 2024-11-21 00:49


NVD link : CVE-2008-3555

Mitre link : CVE-2008-3555

CVE.ORG link : CVE-2008-3555


JSON object : View

Products Affected

wsn

  • gallery
  • forum
  • knowledge_base
  • links
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')