1 results (0.039 seconds)

CVSS: 6.8EPSS: 5%CPEs: 1EXPL: 3

Multiple directory traversal vulnerabilities in Phpkobo AdFreely (aka Ad Board Script) 1.01, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a ..// (dot dot slash slash) in the LANG_CODE parameter to common.inc.php in (1) codelib/cfg/, (2) codelib/sys/, (3) staff/, and (4) staff/app/; and (5) staff/file.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en Phpkobo AdFreely (también conocido como Ad Board Script) v1.01, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres ..// (punto punto barra barra) en el parámetro LANG_CODE sobre common.inc.php en (1) codelib/cfg/, (2) codelib/sys/, (3) staff/ y (4) staff/app/; y (5) staff/file.php. NOTA: algunos de estos detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/11722 http://osvdb.org/62926 http://secunia.com/advisories/38947 http://www.exploit-db.com/exploits/11722 http://www.securityfocus.com/bid/38731 http://www.vupen.com/english/advisories/2010/0611 https://exchange.xforce.ibmcloud.com/vulnerabilities/56858 https://exchange.xforce.ibmcloud.com/vulnerabilities/56865 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •