Multiple directory traversal vulnerabilities in PHP Project Management 0.8.10 and earlier allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the def_lang parameter to modules/files/list.php; the m_path parameter to (2) modules/projects/summary.inc.php or (3) modules/tasks/summary.inc.php; (4) the module parameter to modules/projects/list.php; or the module parameter to index.php in the (5) certinfo, (6) emails, (7) events, (8) fax, (9) files, (10) groupadm, (11) history, (12) info, (13) log, (14) mail, (15) messages, (16) organizations, (17) phones, (18) presence, (19) projects, (20) reports, (21) search, (22) snf, (23) syslog, (24) tasks, or (25) useradm subdirectory of modules/.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/4549 | exploit |
http://osvdb.org/41951 | vdb entry |
http://osvdb.org/41954 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37348 | vdb entry |
http://osvdb.org/41975 | vdb entry |
http://osvdb.org/41972 | vdb entry |
http://osvdb.org/41955 | vdb entry |
http://osvdb.org/41970 | vdb entry |
http://osvdb.org/41960 | vdb entry |
http://osvdb.org/41956 | vdb entry |
http://osvdb.org/41974 | vdb entry |
http://osvdb.org/41963 | vdb entry |
http://www.securityfocus.com/bid/26148 | vdb entry |
http://secunia.com/advisories/27347 | third party advisory |