Vulnerability Description
Multiple directory traversal vulnerabilities in Exero CMS 1.0.0 and 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter to (1) custompage.php, (2) errors/404.php, (3) members/memberslist.php, (4) members/profile.php, (5) news/fullview.php, (6) news/index.php, (7) nopermission.php, (8) usercp/avatar.php, or (9) usercp/editpassword.php in themes/Default/. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exerocms | Exero Cms | 1.0.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/30711Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=607502
- http://www.securityfocus.com/bid/29788Patch
- http://secunia.com/advisories/30711Vendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=607502
- http://www.securityfocus.com/bid/29788Patch
FAQ
What is CVE-2008-2840?
CVE-2008-2840 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple directory traversal vulnerabilities in Exero CMS 1.0.0 and 1.0.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter to (1) custompag...
How severe is CVE-2008-2840?
CVE-2008-2840 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2840?
Check the references section above for vendor advisories and patch information. Affected products include: Exerocms Exero Cms.