Vulnerability CVE-2009-4421


Published: 2009-12-24   Modified: 2012-02-13

Description:
Directory traversal vulnerability in languages_cgi.php in Simple PHP Blog 0.5.1 and earlier allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the blog_language1 parameter.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Simple PHP Blog <= 0.5.1 Local File Include vulnerability
ISecAuditors
26.12.2009

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Alexander palmo -> Simple php blog 

 References:
http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0398.html
http://www.securityfocus.com/archive/1/508546/100/0/threaded
http://www.securityfocus.com/bid/37434
https://exchange.xforce.ibmcloud.com/vulnerabilities/54970

Copyright 2024, cxsecurity.com

 

Back to Top