Directory traversal vulnerability in lib/translation.functions.php in CMS Made Simple before 1.8.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the default_cms_lang parameter to an admin script, as demonstrated by admin/addbookmark.php, a different vulnerability than CVE-2008-5642.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.cmsmadesimple.org/2010/07/3/announcing-cms-made-simple-1-8-1-mankara/ | vendor advisory |
http://www.openwall.com/lists/oss-security/2010/08/01/2 | mailing list |
http://secunia.com/advisories/40031 | third party advisory vendor advisory |
http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html | |
http://www.openwall.com/lists/oss-security/2010/08/02/8 | mailing list |