index.php in EZDatabase before 2.1.2 does not properly cleanse the p parameter before constructing and including a .php filename, which allows remote attackers to conduct directory traversal attacks, and produces resultant cross-site scripting (XSS) and path disclosure.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/16257 | vdb entry exploit |
http://www.securityfocus.com/archive/1/422071/100/0/threaded | mailing list |
http://zur.homelinux.com/Advisories/ezdatabase_dir_trans.txt | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24134 | vdb entry |
http://secunia.com/advisories/18043 | third party advisory vendor advisory |
http://www.osvdb.org/22684 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24135 | vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0515.html | vendor advisory mailing list exploit |