Show plain JSON{"id": "CVE-2008-3486", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-08-06T17:41:00.000", "references": [{"url": "http://secunia.com/advisories/31295", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/4108", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/30480", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44133", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/6178", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/31295", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/4108", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/30480", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44133", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/6178", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in the user_get_profile function in include/functions.inc.php in Coppermine Photo Gallery (CPG) 1.4.18 and earlier, when the charset is utf-8, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang part of serialized data in an _data cookie."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en la funci\u00f3n user_get_profile de include/functions.inc.php en Coppermine Photo Gallery (CPG) 1.4.18 y versiones anteriores, cuando el conjunto de caracteres es utf-8, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n a trav\u00e9s de .. (punto punto) en la parte lang de series de datos en una cookie an_data."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18597B1E-61F4-4BBA-90B5-5B5F5BF78B85", "versionEndIncluding": "1.4.18"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E358276F-157E-4D98-9055-061E6F2F2948"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A1831F9-4B4A-4226-B219-B3AFF06FFDBA"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C457C25-AF6B-4F67-BD3B-83361A48CDBB"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1:beta_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "808B8E20-BE09-4FC2-BC73-2F10261E82B5"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2003E2A5-A902-45A1-9189-15B956976ECD"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A53D1BF-C884-40F9-9D46-9CCD9ADC183E"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34A35889-023F-4305-A5A8-F7A8D3409172"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E51F81AC-6AE1-40E5-B2CB-34E1B5985C93"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A465AB3-1426-4966-87DF-A1FA3FCCE5A9"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.2.1:b-nuke:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9D7FF03-F2A7-4014-BF17-8393F5220AC4"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC98C672-0D2E-4A78-A206-CC44A5A6E14E"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60C520A7-686D-40AB-A41B-EDDF3EC86819"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AFF3F0F-88BF-4EB4-8DCA-4D46D181FCF2"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.1:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "196B664C-C400-4770-893B-E327D40CD525"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3BF818D-86E5-4886-9447-FE70CBEAEA0B"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B94FCD31-EECA-4323-A63A-554A2AFB3DA5"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C70B0A-C8C8-449E-A8C4-A595B7404DED"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4388EF8-6825-4E8A-B9F2-7D2F69A95865"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27D59D3A-F55C-4403-BD43-35162EC0E4FA"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13B39376-C331-45B5-95AD-C3DD56BBF687"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF3DFE45-B65A-46FB-8584-A338143E4F68"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15516E4B-8B16-4B81-8881-2E358144BA79"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECEE8E75-36D2-4F99-967E-52FDFA150E17"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8946662-2C1C-4113-977F-5D7FC3161565"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2F59212-9725-4926-9905-28C8C64A3A58"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5FB7773-BBCA-4825-8489-7EE43D6BD312"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71058CB9-81CA-4F5B-8204-F21C906A71EE"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "197EF2C1-ADCF-4596-B5A0-689C10720906"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB199205-489B-4BB7-81A4-94D45E19349B"}, {"criteria": "cpe:2.3:a:coppermine-gallery:coppermine_photo_gallery:1.4.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFD299AB-0B18-472B-B99E-C0D585AA21CE"}], "operator": "OR"}]}], "evaluatorImpact": "http://secunia.com/advisories/31295:\r\n\"Successful exploitation requires that \"Character encoding\" is set to \"Unicode (recommended) (utf-8)\", which is the default value.\"", "sourceIdentifier": "cve@mitre.org"}