Vulnerability Description
plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linpha | Linpha | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29724Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=595725
- http://www.osvdb.org/50229
- http://www.securityfocus.com/bid/28654
- http://www.vupen.com/english/advisories/2008/1136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41676
- https://www.exploit-db.com/exploits/5392
- http://secunia.com/advisories/29724Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=595725
- http://www.osvdb.org/50229
- http://www.securityfocus.com/bid/28654
- http://www.vupen.com/english/advisories/2008/1136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41676
- https://www.exploit-db.com/exploits/5392
FAQ
What is CVE-2008-1856?
CVE-2008-1856 is a vulnerability with a CVSS score of 5.1 (MEDIUM). plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory t...
How severe is CVE-2008-1856?
CVE-2008-1856 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1856?
Check the references section above for vendor advisories and patch information. Affected products include: Linpha Linpha.