Directory traversal vulnerability in data/inc/lib/pcltar.lib.php in Pluck 4.5.3, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the g_pcltar_lib_dir parameter.
References
Configurations
History
21 Nov 2024, 00:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32736 - Vendor Advisory | |
References | () http://www.pluck-cms.org/index.php?file=kop11.php - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/498438 - Exploit | |
References | () http://www.securityfocus.com/bid/32342 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46676 - | |
References | () https://www.exploit-db.com/exploits/7153 - |
Information
Published : 2009-02-24 18:30
Updated : 2024-11-21 00:56
NVD link : CVE-2008-6253
Mitre link : CVE-2008-6253
CVE.ORG link : CVE-2008-6253
JSON object : View
Products Affected
pluck-cms
- pluck
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')