Vulnerability Description
Directory traversal vulnerability in plugins/ddb/foot.php in Strawberry 1.1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the file parameter to example/index.php. NOTE: this was originally reported as an issue affecting the do parameter, but traversal with that parameter might depend on a modified example/index.php. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Strawberry | Strawberry | 1.1.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/28330Vendor Advisory
- http://www.securityfocus.com/bid/34971Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50562
- https://www.exploit-db.com/exploits/8681
- http://secunia.com/advisories/28330Vendor Advisory
- http://www.securityfocus.com/bid/34971Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50562
- https://www.exploit-db.com/exploits/8681
FAQ
What is CVE-2009-1774?
CVE-2009-1774 is a vulnerability with a CVSS score of 9.3 (HIGH). Directory traversal vulnerability in plugins/ddb/foot.php in Strawberry 1.1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the file parameter to example/i...
How severe is CVE-2009-1774?
CVE-2009-1774 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1774?
Check the references section above for vendor advisories and patch information. Affected products include: Strawberry Strawberry.