CVE-2008-1856
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
16/04/2008
Last modified:
09/04/2025
Description
plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
Impact
Base Score 2.0
5.10
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:linpha:linpha:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:0.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:0.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:0.9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:0.9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:linpha:linpha:1.3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/29724
- http://sourceforge.net/project/shownotes.php?release_id=595725
- http://www.osvdb.org/50229
- http://www.securityfocus.com/bid/28654
- http://www.vupen.com/english/advisories/2008/1136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41676
- https://www.exploit-db.com/exploits/5392
- http://secunia.com/advisories/29724
- http://sourceforge.net/project/shownotes.php?release_id=595725
- http://www.osvdb.org/50229
- http://www.securityfocus.com/bid/28654
- http://www.vupen.com/english/advisories/2008/1136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41676
- https://www.exploit-db.com/exploits/5392