CVE-2009-1912
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
04/06/2009
Last modified:
09/04/2025
Description
Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:webspell:webspell:*:*:*:*:*:*:*:* | 4.2.0e (including) | |
| cpe:2.3:a:webspell:webspell:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.0.2c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.01.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.01.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.01.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.2.0c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:webspell:webspell:4.2.0d:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/54295
- http://secunia.com/advisories/35016
- http://www.osvdb.org/54296
- http://www.securityfocus.com/bid/34862
- http://www.webspell.org/
- http://www.webspell.org/index.php?site=files&file=30
- http://www.webspell.org/index.php?site=news_comments&newsID=130
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50395
- https://www.exploit-db.com/exploits/8622
- http://osvdb.org/54295
- http://secunia.com/advisories/35016
- http://www.osvdb.org/54296
- http://www.securityfocus.com/bid/34862
- http://www.webspell.org/
- http://www.webspell.org/index.php?site=files&file=30
- http://www.webspell.org/index.php?site=news_comments&newsID=130
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50395
- https://www.exploit-db.com/exploits/8622



