Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
References
Configurations
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/32850 - Exploit | |
References | () https://www.exploit-db.com/exploits/7482 - |
Information
Published : 2008-12-30 20:30
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5776
Mitre link : CVE-2008-5776
CVE.ORG link : CVE-2008-5776
JSON object : View
Products Affected
apertoblog
- apertoblog
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')