First published: Fri Nov 18 2005(Updated: )
Directory traversal vulnerability in editor_registry.php in XOOPS 2.2.3 allows remote attackers to read or include arbitrary local files via a .. (dot dot) in the xoopsConfig[language] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xoops Xm Memberstats | =2.2.3 | |
Xoops | =2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3680 has been classified as a high severity vulnerability due to its ability to allow unauthorized access to arbitrary local files.
To fix CVE-2005-3680, upgrade your XOOPS installation to a version beyond 2.2.3 where this vulnerability is patched.
CVE-2005-3680 can be exploited by remote attackers using directory traversal techniques to read or include sensitive files from the server.
CVE-2005-3680 specifically affects XOOPS version 2.2.3.
The primary impact of CVE-2005-3680 is the unauthorized disclosure of sensitive information from local files on the server.