Directory traversal vulnerability in module.php in PhpGedView 4.2.3 and possibly other versions, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the pgvaction parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://sourceforge.net/projects/phpgedview/forums/forum/185166/topic/4040059 | exploit |
http://www.vupen.com/english/advisories/2011/0036 | vdb entry vendor advisory |
http://osvdb.org/70295 | vdb entry |
http://www.exploit-db.com/exploits/15913 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64733 | vdb entry |
http://sourceforge.net/tracker/?func=detail&aid=3152857&group_id=55456&atid=477081 | patch |
http://secunia.com/advisories/42786 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/45674 | vdb entry |