CVE-2008-3675

Directory traversal vulnerability in classes/imgsize.php in Gelato 0.95 allows remote attackers to read arbitrary files via (1) a .. (dot dot) and possibly (2) a full pathname in the img parameter. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gelatocms:gelatocms:0.95:*:*:*:*:*:*:*

History

21 Nov 2024, 00:49

Type Values Removed Values Added
References () http://secunia.com/advisories/31456 - Vendor Advisory () http://secunia.com/advisories/31456 - Vendor Advisory
References () http://securityreason.com/securityalert/4154 - () http://securityreason.com/securityalert/4154 -
References () http://www.securityfocus.com/bid/30672 - () http://www.securityfocus.com/bid/30672 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44416 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44416 -
References () https://www.exploit-db.com/exploits/6235 - () https://www.exploit-db.com/exploits/6235 -

Information

Published : 2008-08-14 19:41

Updated : 2024-11-21 00:49


NVD link : CVE-2008-3675

Mitre link : CVE-2008-3675

CVE.ORG link : CVE-2008-3675


JSON object : View

Products Affected

gelatocms

  • gelatocms
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')