plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41676 | vdb entry |
https://www.exploit-db.com/exploits/5392 | exploit |
http://sourceforge.net/project/shownotes.php?release_id=595725 | |
http://www.osvdb.org/50229 | vdb entry |
http://secunia.com/advisories/29724 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/28654 | vdb entry |
http://www.vupen.com/english/advisories/2008/1136 | vdb entry |