First published: Tue Sep 27 2005(Updated: )
contrib/example.php in GeSHi before 1.0.7.3 allows remote attackers to read arbitrary files via the language field without a source field set.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Geshi | =1.0.0 | |
Geshi | =1.0.1 | |
Geshi | =1.0.2 | |
Geshi | =1.0.3 | |
Geshi | =1.0.4 | |
Geshi | =1.0.5 | |
Geshi | =1.0.6 | |
Geshi | =1.0.7 | |
Geshi | =1.0.7.1 | |
Geshi | =1.0.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3080 is classified as a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2005-3080, upgrade GeSHi to version 1.0.7.3 or later where the vulnerability has been addressed.
CVE-2005-3080 can be exploited through remote file reading attacks that allow attackers to access sensitive files on the server.
CVE-2005-3080 affects GeSHi versions 1.0.0 to 1.0.7.2.
The vulnerability in CVE-2005-3080 resides in contrib/example.php where improper handling of input can lead to unauthorized file access.