Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-1912

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2009-1912
Last Modified 05 Jun 2009 12:00:00
Published 04 Jun 2009 12:30:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2009-1912

Summary

Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.

Vulnerable Systems

Application

  • Webspell 4.0

  • Webspell 4.0.2c

  • Webspell 4.01.00

  • Webspell 4.01.01

  • Webspell 4.01.02

  • Webspell 4.1

  • Webspell 4.1.1

  • Webspell 4.1.2

  • Webspell 4.2.0c

  • Webspell 4.2.0d

  • Webspell 4.2.0e


References

CONFIRM - http://www.webspell.org/index.php?site=news_comments&newsID=130

CONFIRM - http://www.webspell.org/index.php?site=files&file=30

CONFIRM - http://www.webspell.org/

BID - 34862

OSVDB - 54296

XF - webspell-awards-sql-injection(50395)

MILW0RM - 8622

SECUNIA - 35016

OSVDB - 54295


Last Updated: 27 May 2016 10:50:43