Description
Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Published: 2008-12-30
Score: 7.5 High
EPSS: 3.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2008-5746 Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
History

No history.

Subscriptions

Apertoblog Apertoblog
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T11:04:44.567Z

Reserved: 2008-12-30T00:00:00.000Z

Link: CVE-2008-5776

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2008-12-30T20:30:01.860

Modified: 2025-04-09T00:30:58.490

Link: CVE-2008-5776

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses