[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4399

Date: (C)2010-12-06   (M)2015-12-16
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











Directory traversal vulnerability in languages.inc.php in DynPG CMS 4.1.1 and 4.2.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the CHG_DYNPG_SET_LANGUAGE parameter to index.php. NOTE: some of these details are obtained from third party information.

Reference:
EXPLOIT-DB-15646
SECUNIA-42380
BID-45115
OSVDB-69539
http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt
http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226
http://www.htbridge.ch/advisory/lfi_in_dynpg.html

CPE    2
cpe:/a:dynpg:dynpg_cms:4.1.1
cpe:/a:dynpg:dynpg_cms:4.2.0
CWE    1
CWE-22

© 2013 SecPod Technologies