thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-04-03 11:30
Updated : 2018-10-11 13:57
NVD link : CVE-2008-6592
Mitre link : CVE-2008-6592
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
sqlite
- sqlite
lightneasy
- lightneasy