Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/32850 | Exploit |
https://www.exploit-db.com/exploits/7482 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2008-12-30T20:00:00
Updated: 2017-09-28T12:57:01
Reserved: 2008-12-30T00:00:00
Link: CVE-2008-5776
JSON object: View
NVD Information
Status : Modified
Published: 2008-12-30T20:30:01.860
Modified: 2017-09-29T01:32:48.183
Link: CVE-2008-5776
JSON object: View
Redhat Information
No data.
CWE