Directory traversal vulnerability in plugins/spaw2/dialogs/dialog.php in BloofoxCMS 0.3.4 allows remote attackers to read arbitrary files via the (1) lang, (2) theme, and (3) module parameters.
                
            References
                    | Link | Resource | 
|---|---|
| http://osvdb.org/51006 | Broken Link | 
| http://secunia.com/advisories/33135 | Broken Link Vendor Advisory | 
| http://securityreason.com/securityalert/4820 | Third Party Advisory | 
| http://www.securityfocus.com/bid/33013 | Broken Link Exploit Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/47611 | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/7580 | Exploit Third Party Advisory VDB Entry | 
| http://osvdb.org/51006 | Broken Link | 
| http://secunia.com/advisories/33135 | Broken Link Vendor Advisory | 
| http://securityreason.com/securityalert/4820 | Third Party Advisory | 
| http://www.securityfocus.com/bid/33013 | Broken Link Exploit Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/47611 | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/7580 | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2008-12-29 15:24
Updated : 2025-04-09 00:30
NVD link : CVE-2008-5748
Mitre link : CVE-2008-5748
CVE.ORG link : CVE-2008-5748
JSON object : View
Products Affected
                bloofox
- bloofoxcms
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
