Vulnerability Description
Directory traversal vulnerability in index.php in PHPizabi 0.848b C1 HFP3 allows remote authenticated administrators to read arbitrary files via (1) a .. (dot dot), (2) a URL, or possibly (3) a full pathname in the id parameter in an admin.templates.edittemplate action. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpizabi | Phpizabi | 0.848b |
Related Weaknesses (CWE)
References
- http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.htmlExploit
- http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txtExploit
- http://secunia.com/advisories/31533Vendor Advisory
- http://www.securityfocus.com/bid/30707Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44509
- http://lostmon.blogspot.com/2008/08/phpizabi-v0848b-traversal-file-access.htmlExploit
- http://packetstormsecurity.org/0808-exploits/phpizabi-traverse.txtExploit
- http://secunia.com/advisories/31533Vendor Advisory
- http://www.securityfocus.com/bid/30707Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44509
FAQ
What is CVE-2008-3723?
CVE-2008-3723 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Directory traversal vulnerability in index.php in PHPizabi 0.848b C1 HFP3 allows remote authenticated administrators to read arbitrary files via (1) a .. (dot dot), (2) a URL, or possibly (3) a full p...
How severe is CVE-2008-3723?
CVE-2008-3723 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3723?
Check the references section above for vendor advisories and patch information. Affected products include: Phpizabi Phpizabi.