CVE-2010-1057
Ad Board Script 1.01 - Local File Inclusion
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Multiple directory traversal vulnerabilities in Phpkobo AdFreely (aka Ad Board Script) 1.01, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a ..// (dot dot slash slash) in the LANG_CODE parameter to common.inc.php in (1) codelib/cfg/, (2) codelib/sys/, (3) staff/, and (4) staff/app/; and (5) staff/file.php. NOTE: some of these details are obtained from third party information.
Vulnerabilidad de salto de directorio en Phpkobo AdFreely (también conocido como Ad Board Script) v1.01, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres ..// (punto punto barra barra) en el parámetro LANG_CODE sobre common.inc.php en (1) codelib/cfg/, (2) codelib/sys/, (3) staff/ y (4) staff/app/; y (5) staff/file.php. NOTA: algunos de estos detalles se han obtenido de información de terceros.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-03-13 First Exploit
- 2010-03-23 CVE Reserved
- 2010-03-23 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://osvdb.org/62926 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/56858 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/56865 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/11722 | 2010-03-13 | |
http://www.exploit-db.com/exploits/11722 | 2024-08-07 | |
http://www.securityfocus.com/bid/38731 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/38947 | 2017-08-17 | |
http://www.vupen.com/english/advisories/2010/0611 | 2017-08-17 |