Vulnerability Description
Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and earlier allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trixbox | Trixbox | <= 2.6.1 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2008-07/0101.html
- http://osvdb.org/50421
- http://www.securityfocus.com/bid/30135Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43686
- https://www.exploit-db.com/exploits/6026
- http://archives.neohapsis.com/archives/fulldisclosure/2008-07/0101.html
- http://osvdb.org/50421
- http://www.securityfocus.com/bid/30135Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43686
- https://www.exploit-db.com/exploits/6026
FAQ
What is CVE-2008-6825?
CVE-2008-6825 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and earlier allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the langChoice paramet...
How severe is CVE-2008-6825?
CVE-2008-6825 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6825?
Check the references section above for vendor advisories and patch information. Affected products include: Trixbox Trixbox.