contrib/example.php in GeSHi before 1.0.7.3 allows remote attackers to read arbitrary files via the language field without a source field set.
References
Link | Resource |
---|---|
http://sourceforge.net/project/shownotes.php?release_id=358285 | Patch |
http://www.securityfocus.com/bid/14903 | Patch |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-09-27 13:03
Updated : 2008-09-05 13:53
NVD link : CVE-2005-3080
Mitre link : CVE-2005-3080
JSON object : View
CWE
Products Affected
geshi
- geshi