Directory traversal vulnerability in index.php in (1) WSN Forum 4.1.43 and earlier, (2) Gallery 4.1.30 and earlier, (3) Knowledge Base (WSNKB) 4.1.36 and earlier, (4) Links 4.1.44 and earlier, and possibly (5) Classifieds before 4.1.30 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the TID parameter, as demonstrated by uploading a .jpg file containing PHP sequences.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/31392 - | |
References | () http://securityreason.com/securityalert/4120 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44236 - | |
References | () https://www.exploit-db.com/exploits/6208 - |
Information
Published : 2008-08-08 19:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3555
Mitre link : CVE-2008-3555
CVE.ORG link : CVE-2008-3555
JSON object : View
Products Affected
wsn
- gallery
- forum
- knowledge_base
- links
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')