Directory traversal vulnerability in plugins/spaw2/dialogs/dialog.php in BloofoxCMS 0.3.4 allows remote attackers to read arbitrary files via the (1) lang, (2) theme, and (3) module parameters.
References
Link | Resource |
---|---|
http://osvdb.org/51006 | Broken Link |
http://secunia.com/advisories/33135 | Broken Link Vendor Advisory |
http://securityreason.com/securityalert/4820 | Third Party Advisory |
http://www.securityfocus.com/bid/33013 | Broken Link Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47611 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/7580 | Exploit Third Party Advisory VDB Entry |
http://osvdb.org/51006 | Broken Link |
http://secunia.com/advisories/33135 | Broken Link Vendor Advisory |
http://securityreason.com/securityalert/4820 | Third Party Advisory |
http://www.securityfocus.com/bid/33013 | Broken Link Exploit Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47611 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/7580 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2008-12-29 15:24
Updated : 2025-04-09 00:30
NVD link : CVE-2008-5748
Mitre link : CVE-2008-5748
CVE.ORG link : CVE-2008-5748
JSON object : View
Products Affected
bloofox
- bloofoxcms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')