1 results (0.000 seconds)

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 1

Directory traversal vulnerability in addressbook.php in the Addressbook 1.2 module for PHP-Nuke allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module_name parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file. Vulnerabilidad de salto de directorio en addressbook.php del módulo Addressbook 1.2 para PHP-Nuke permite a atacantes remotos incluir y ejecutar ficheros locales de su elección mediante una secuencia .. (punto punto) en el parámetro module_name, como ha sido demostrado inyectando secuencias PHP en el fichero de log de Apache HTTP Server. • https://www.exploit-db.com/exploits/3582 http://osvdb.org/36572 http://secunia.com/advisories/24697 http://www.securityfocus.com/bid/23156 http://www.vupen.com/english/advisories/2007/1118 https://exchange.xforce.ibmcloud.com/vulnerabilities/33243 •