Show plain JSON{"id": "CVE-2008-5776", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2008-12-30T20:30:01.860", "references": [{"url": "http://www.securityfocus.com/bid/32850", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/7482", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/32850", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/7482", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en Aperto Blog v0.1.1 permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n a trav\u00e9s de secuencias de escalado de directorios en (1) el par\u00e1metro action en admin.php y el (2) par\u00e1metro get en index.php. NOTA: en algunos entornos esto puede ser aprovechado para la inclusi\u00f3n remota de fichero usando una ruta compartida UNC o una URL ftp, ftps o ssh2.sftp."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:apertoblog:apertoblog:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD65E8A0-2968-46A6-9E70-95AC1F43FE9C"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}