Directory traversal vulnerability in upgrade.php in Piwigo before 2.3.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter.
References
Configurations
History
21 Nov 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-04/0196.html - Exploit | |
References | () http://piwigo.org/bugs/view.php?id=2607 - | |
References | () http://piwigo.org/forum/viewtopic.php?id=19173 - | |
References | () http://piwigo.org/releases/2.3.4 - | |
References | () http://secunia.com/advisories/48903 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/18782 - Exploit | |
References | () http://www.securityfocus.com/bid/53245 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75185 - | |
References | () https://www.htbridge.com/advisory/HTB23085 - |
Information
Published : 2012-08-14 22:55
Updated : 2024-11-21 01:38
NVD link : CVE-2012-2208
Mitre link : CVE-2012-2208
CVE.ORG link : CVE-2012-2208
JSON object : View
Products Affected
piwigo
- piwigo
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')