Multiple directory traversal vulnerabilities in index.php in Linker IMG 1.0 and earlier allow remote attackers to read and execute arbitrary local files via a URL in the (1) cook_lan cookie parameter ($lan_dir variable) or possibly (2) Sdb_type parameter. NOTE: this was originally reported as remote file inclusion, but this may be inaccurate.
References
Configurations
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/1006-exploits/linkerimg-rfi.txt - Exploit | |
References | () http://www.attrition.org/pipermail/vim/2010-June/002354.html - Exploit | |
References | () http://www.exploit-db.com/exploits/13964 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/1562 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/59614 - |
Information
Published : 2010-06-25 21:30
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2456
Mitre link : CVE-2010-2456
CVE.ORG link : CVE-2010-2456
JSON object : View
Products Affected
codelib
- linker_img
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')