Directory traversal vulnerability in www/index.php in Sahana 0.6.2.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter.
References
Configurations
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://sahana.cvs.sourceforge.net/viewvc/sahana/sahana-phase2/www/index.php?r1=1.83&r2=1.84 - Patch | |
References | () http://sourceforge.net/mailarchive/forum.php?thread_name=5d9043b70910191044l4bb0178fs563a5128a0f5db01%40mail.gmail.com&forum_name=sahana-maindev - | |
References | () http://www.openwall.com/lists/oss-security/2009/10/22/3 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2009/10/22/6 - Patch | |
References | () http://www.securityfocus.com/bid/36826 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=530255 - Patch | |
References | () https://fedorahosted.org/rel-eng/ticket/2635 - |
Information
Published : 2009-10-26 16:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3625
Mitre link : CVE-2009-3625
CVE.ORG link : CVE-2009-3625
JSON object : View
Products Affected
sahana
- sahana
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')