6.8

CVE-2009-1912

Exploit

Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WebspellWebspell Version <= 4.2.0e
WebspellWebspell Version4.0
WebspellWebspell Version4.0.2c
WebspellWebspell Version4.1
WebspellWebspell Version4.01.00
WebspellWebspell Version4.1.1
WebspellWebspell Version4.01.01
WebspellWebspell Version4.01.02
WebspellWebspell Version4.1.2
WebspellWebspell Version4.2.0c
WebspellWebspell Version4.2.0d
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.98% 0.758
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.