Directory traversal vulnerability in index.php in Simple Machines Forum (SMF) 1.0 before 1.0.15 and 1.1 before 1.1.7 allows remote authenticated users to configure arbitrary local files for execution via directory traversal sequences in the value of the theme_dir field during a jsoption action, related to Sources/QueryString.php and Sources/Themes.php, as demonstrated by a local .gif file in attachments/ with PHP code that was uploaded through a profile2 action to index.php.
References
Link | Resource |
---|---|
http://osvdb.org/50072 | |
http://secunia.com/advisories/32516 | Vendor Advisory |
http://www.securityfocus.com/bid/32139 | Exploit |
http://www.simplemachines.org/community/index.php?topic=272861.0 | Vendor Advisory |
https://www.exploit-db.com/exploits/7011 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2009-04-07T19:00:00
Updated: 2017-09-28T12:57:01
Reserved: 2009-04-07T00:00:00
Link: CVE-2008-6659
JSON object: View
NVD Information
Status : Modified
Published: 2009-04-07T19:30:00.267
Modified: 2017-09-29T01:33:16.870
Link: CVE-2008-6659
JSON object: View
Redhat Information
No data.
CWE