Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:4homepages:4images:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF94F6C2-538E-4F28-86EA-2B9239854C32", "versionEndIncluding": "1.7.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.0:rc-1:*:*:*:*:*:*", "matchCriteriaId": "5F1EA256-97EB-4FCF-A31E-DCC1C49AA801", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.0:rc-2:*:*:*:*:*:*", "matchCriteriaId": "1D979480-B42C-4213-B36E-D99DA55EE6E5", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "1726F108-46EA-4CCF-A635-85F681E14471", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "9DDDCA47-89BD-4262-9567-731F9875D2FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "9EDBC8A3-6C85-4915-B658-F7129CF82BD1", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "AB41A1A3-69D5-4175-BF6C-285C0C9990E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "9029C35C-D961-419A-A79F-9EFACAD2560A", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "CD8FBCEC-1F99-4DF1-A9E5-CFE353D2D359", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "729F3EA5-9289-435E-92BD-1C12E839988A", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F7B51C8F-0710-4C7A-A08B-FE940CFF12D3", "vulnerable": true}, {"criteria": "cpe:2.3:a:4homepages:4images:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "B1E5D3F1-18E8-4E5C-BBCD-55AC38A06028", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in global.php in 4images before 1.7.7, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the l parameter."}, {"lang": "es", "value": "Vulnerabilidad de salto de directorio en global.php en 4images versi\u00f3n anterior a v1.7.7, cuando est\u00e1 inhabilitado magic_quotes_gpc, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n mediante secuencias de salto de directorio en el par\u00e1metro \"l\"."}], "id": "CVE-2009-2132", "lastModified": "2024-11-21T01:04:12.257", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-06-19T18:00:00.390", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://bbs.wolvez.org/topic/56/"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/35427"}, {"source": "cve@mitre.org", "url": "http://www.4homepages.de/forum/index.php?topic=15186.0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://bbs.wolvez.org/topic/56/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/35427"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.4homepages.de/forum/index.php?topic=15186.0"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}