Directory traversal vulnerability in index.php in L2J Statistik Script 0.09 and earlier, when register_globals is enabled and magic_quotes is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/35914 - | |
References | () http://www.securityfocus.com/bid/21914 - Exploit, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2007/0097 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31309 - | |
References | () https://www.exploit-db.com/exploits/3091 - |
Information
Published : 2007-01-11 00:28
Updated : 2025-04-09 00:30
NVD link : CVE-2007-0173
Mitre link : CVE-2007-0173
CVE.ORG link : CVE-2007-0173
JSON object : View
Products Affected
l2j
- statistik_script
CWE