Vulnerability CVE-2009-4088


Published: 2009-11-29   Modified: 2012-02-13

Description:
Multiple directory traversal vulnerabilities in telepark.wiki 2.4.23 and earlier allow remote attackers to read arbitrary files via directory traversal sequences in the css parameter to (1) getjs.php and (2) getcsslocal.php; and include and execute arbitrary local files via the (3) group parameter to upload.php.

See advisories in our WLB2 database:
Topic
Author
Date
High
Telepark Wiki 2.4.23 code execution, delete page, and cross site scripting
Abysssec
19.11.2009

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Telepark -> Telepark.wiki 

 References:
http://blog.telepark.com/telepark-web-software/2009/11/09/telepark-wiki-security-fixes/
http://xforce.iss.net/xforce/xfdb/54327
http://www.osvdb.org/60218
http://www.osvdb.org/60217
http://www.osvdb.org/60216
http://www.exploit-db.com/exploits/9483
http://secunia.com/advisories/37391
http://packetstormsecurity.org/0911-exploits/Telepark-fixes-nov09-2.txt

Copyright 2024, cxsecurity.com

 

Back to Top