Multiple directory traversal vulnerabilities in Social Engine 2.0 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the global_lang parameter to (1) header_album.php, (2) header_blog.php, or (3) header_group.php; or (4) admin_header_album.php, (5) admin_header_blog.php, or (6) admin_header_group.php in admin/.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://osvdb.org/40371 | vdb entry |
https://www.exploit-db.com/exploits/4767 | exploit |
http://osvdb.org/40373 | vdb entry |
http://osvdb.org/40370 | vdb entry |
http://osvdb.org/40374 | vdb entry |
http://osvdb.org/40375 | vdb entry |
http://osvdb.org/40372 | vdb entry |
http://www.securityfocus.com/bid/26990 | vdb entry exploit |
http://www.inj3ct-it.org/exploit/socialengine2.txt | exploit |