CVE-2008-5776

Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apertoblog:apertoblog:0.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:54

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/32850 - Exploit () http://www.securityfocus.com/bid/32850 - Exploit
References () https://www.exploit-db.com/exploits/7482 - () https://www.exploit-db.com/exploits/7482 -

Information

Published : 2008-12-30 20:30

Updated : 2024-11-21 00:54


NVD link : CVE-2008-5776

Mitre link : CVE-2008-5776

CVE.ORG link : CVE-2008-5776


JSON object : View

Products Affected

apertoblog

  • apertoblog
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')