5.1

CVE-2008-1856

plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinphaLinpha Version0.9.0
LinphaLinpha Version0.9.1
LinphaLinpha Version0.9.2
LinphaLinpha Version0.9.3
LinphaLinpha Version0.9.4
LinphaLinpha Version1.0 Updatebeta1
LinphaLinpha Version1.0 Updatebeta2
LinphaLinpha Version1.0 Updatebeta3
LinphaLinpha Version1.0 Updaterc1
LinphaLinpha Version1.1.0
LinphaLinpha Version1.1.1
LinphaLinpha Version1.2.0
LinphaLinpha Version1.3.0
LinphaLinpha Version1.3.1
LinphaLinpha Version1.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.02% 0.88
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.1 4.9 6.4
AV:N/AC:H/Au:N/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.