Multiple directory traversal vulnerabilities in Tribiq CMS 5.0.12c, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and possibly execute arbitrary files via directory traversal sequences in the template_path parameter to (1) masthead.inc.php, (2) toppanel.inc.php, and (3) contact.inc.php in templates/mytribiqsite/tribiq-CL-9000/includes; and the use_template_family parameter to (4) templates/mytribiqsite/tribiq-CL-9000/includes/nlarlist_content.inc.php. NOTE: the tribal-GPL-1066/includes/header.inc.php vector is already covered by CVE-2008-4894.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/35484 | Exploit |
http://secunia.com/advisories/35535 | Exploit Vendor Advisory |
http://www.exploit-db.com/exploits/9012 |
Configurations
Information
Published : 2009-06-26 08:30
Updated : 2017-09-18 18:29
NVD link : CVE-2009-2220
Mitre link : CVE-2009-2220
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
tribiq
- tribiq_cms