CVE-2008-3851

Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a ..\ (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.php; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.php. NOTE: the issue involving vectors 1 through 3 reportedly exists because of an incomplete fix for CVE-2008-3194.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:a:pluck:pluck:4.5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://secunia.com/advisories/31607 - Vendor Advisory () http://secunia.com/advisories/31607 - Vendor Advisory
References () http://securityreason.com/securityalert/4195 - () http://securityreason.com/securityalert/4195 -
References () http://www.pluck-cms.org/releasenotes.php#4.5.3 - () http://www.pluck-cms.org/releasenotes.php#4.5.3 -
References () http://www.securityfocus.com/archive/1/495706/100/0/threaded - () http://www.securityfocus.com/archive/1/495706/100/0/threaded -
References () http://www.securityfocus.com/bid/30820 - Exploit, Patch () http://www.securityfocus.com/bid/30820 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/44677 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/44677 -
References () https://www.exploit-db.com/exploits/6300 - () https://www.exploit-db.com/exploits/6300 -

Information

Published : 2008-08-27 23:41

Updated : 2024-11-21 00:50


NVD link : CVE-2008-3851

Mitre link : CVE-2008-3851

CVE.ORG link : CVE-2008-3851


JSON object : View

Products Affected

microsoft

  • windows

pluck

  • pluck
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')