CVE-2008-6877

Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zen_cart:zen_cart:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:zen_cart:zen_cart:1.3.8a:*:*:*:*:*:*:*

History

07 Nov 2023, 02:03

Type Values Removed Values Added
Summary ** DISPUTED ** Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths." Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating "at worst, the use of this vulnerability will reveal some local file paths.

Information

Published : 2009-07-27 14:30

Updated : 2024-08-07 12:15


NVD link : CVE-2008-6877

Mitre link : CVE-2008-6877

CVE.ORG link : CVE-2008-6877


JSON object : View

Products Affected

zen_cart

  • zen_cart
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')