Directory traversal vulnerability in randompic.php in pppBLOG 0.3.8 and earlier, when register_globals is enabled, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an index of the "file" array parameter, as demonstrated by file[0].
Link | Tags |
---|---|
http://retrogod.altervista.org/pppblog_038_xpl.html | exploit |
http://www.securityfocus.com/bid/18189 | vdb entry exploit |
http://secunia.com/advisories/20375 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26969 | vdb entry |
http://www.securityfocus.com/archive/1/435406/100/0/threaded | mailing list |
http://securityreason.com/securityalert/1015 | third party advisory |
http://www.vupen.com/english/advisories/2006/2085 | vdb entry |
http://securitytracker.com/id?1016198 | vdb entry |