CVE-2011-5210

Directory traversal vulnerability in admin/preview.php in Limny 3.0.0 allows remote attackers to read arbitrary files via a ..%2F (encoded dot dot slash) in the theme parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:limny:limny:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://secunia.com/advisories/43124 - Vendor Advisory () http://secunia.com/advisories/43124 - Vendor Advisory
References () http://www.autosectools.com/Advisories/Limny.3.0.0_Local.File.Inclusion_99.html - Exploit () http://www.autosectools.com/Advisories/Limny.3.0.0_Local.File.Inclusion_99.html - Exploit
References () http://www.limny.org/releases/limny-3.0.2.7z - Patch () http://www.limny.org/releases/limny-3.0.2.7z - Patch
References () http://www.osvdb.org/70747 - () http://www.osvdb.org/70747 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65083 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65083 -

Information

Published : 2012-10-09 15:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5210

Mitre link : CVE-2011-5210

CVE.ORG link : CVE-2011-5210


JSON object : View

Products Affected

limny

  • limny
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')