Multiple directory traversal vulnerabilities in index.php in FOG Forum 0.8.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) fog_lang and (2) fog_skin parameters, probably related to libs/required/share.inc; and possibly the (3) fog_pseudo, (4) fog_posted, (5) fog_password, and (6) fog_cook parameters.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://securityreason.com/securityalert/3971 | third party advisory |
http://www.securityfocus.com/bid/29651 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42985 | vdb entry |
https://www.exploit-db.com/exploits/5784 | exploit |
http://secunia.com/advisories/30613 | third party advisory vendor advisory |