The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/49488 - | |
References | () http://secunia.com/advisories/32559 - Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=637321 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2008/11/10/8 - | |
References | () http://www.securityfocus.com/bid/32070 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46271 - |
07 Nov 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
Summary | The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path |
Information
Published : 2008-11-21 02:30
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5186
Mitre link : CVE-2008-5186
CVE.ORG link : CVE-2008-5186
JSON object : View
Products Affected
geshi
- geshi
CWE
CWE-20
Improper Input Validation