Directory traversal vulnerability in vote.php in Good/Bad Vote allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the id parameter in a dovote action. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/35835 | Vendor Advisory |
http://www.exploit-db.com/exploits/9185 | |
http://www.osvdb.org/55918 | Exploit |
http://secunia.com/advisories/35835 | Vendor Advisory |
http://www.exploit-db.com/exploits/9185 | |
http://www.osvdb.org/55918 | Exploit |
Configurations
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/35835 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/9185 - | |
References | () http://www.osvdb.org/55918 - Exploit |
Information
Published : 2010-03-10 22:30
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4683
Mitre link : CVE-2009-4683
CVE.ORG link : CVE-2009-4683
JSON object : View
Products Affected
scriptsez
- good\/bad_vote
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')