Vulnerability Description
Multiple directory traversal vulnerabilities in TinX/cms 1.1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) language parameter to (a) include_me.php, (b) admin/ajax.php, and (c) admin/objects/catalog.ajaxhandler.php; and the (2) prefix parameter to (d) admin/inc/config.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tinx Cms | Tinx Cms | 1.1 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/29907Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43305
- https://www.exploit-db.com/exploits/5917
- http://www.securityfocus.com/bid/29907Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43305
- https://www.exploit-db.com/exploits/5917
FAQ
What is CVE-2008-2976?
CVE-2008-2976 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple directory traversal vulnerabilities in TinX/cms 1.1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in...
How severe is CVE-2008-2976?
CVE-2008-2976 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2976?
Check the references section above for vendor advisories and patch information. Affected products include: Tinx Cms Tinx Cms.