CVE-2009-1318

Directory traversal vulnerability in index.php in Jamroom 3.1.2, 3.2.3 through 3.2.6, 4.0.2, and possibly other versions before 3.4.0 allows remote attackers to include arbitrary files via directory traversal sequences in the t parameter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jamroom:jamroom:*:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:b1:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:b2:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:b3:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:b4:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:1.0:b5:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.0.9:a:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.60:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.60:rc2:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.60:rc3:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.61:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.62:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.63:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.64:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.65:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.66:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.67:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.68:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:2.69:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b1:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b2:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b3:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b4:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b5:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b6:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b7:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0:b8:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.19:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.20:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.23:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.24:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.25:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.26:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.27:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.28:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.29:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.0.30:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.7:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:3.3.8:*:*:*:*:*:*:*
cpe:2.3:a:jamroom:jamroom:4.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://www.jamroom.net/index.php?m=td_tracker&o=view&id=1470 - Vendor Advisory () http://www.jamroom.net/index.php?m=td_tracker&o=view&id=1470 - Vendor Advisory
References () http://www.securityfocus.com/bid/34511 - Exploit () http://www.securityfocus.com/bid/34511 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49869 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49869 -
References () https://www.exploit-db.com/exploits/8423 - () https://www.exploit-db.com/exploits/8423 -

Information

Published : 2009-04-17 14:08

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1318

Mitre link : CVE-2009-1318

CVE.ORG link : CVE-2009-1318


JSON object : View

Products Affected

jamroom

  • jamroom
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')