Directory traversal vulnerability in language.php in VerliAdmin 0.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/32352 - | |
References | () http://www.vupen.com/english/advisories/2007/0035 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31241 - | |
References | () https://www.exploit-db.com/exploits/3075 - |
Information
Published : 2007-01-05 18:28
Updated : 2024-11-21 00:24
NVD link : CVE-2007-0098
Mitre link : CVE-2007-0098
CVE.ORG link : CVE-2007-0098
JSON object : View
Products Affected
verliadmin
- verliadmin
CWE