First published: Fri Nov 21 2008(Updated: )
** DISPUTED ** The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Geshi | <=1.0.8 | |
Geshi | =1.0.0 | |
Geshi | =1.0.1 | |
Geshi | =1.0.2 | |
Geshi | =1.0.2_beta_1 | |
Geshi | =1.0.3 | |
Geshi | =1.0.4 | |
Geshi | =1.0.5 | |
Geshi | =1.0.6 | |
Geshi | =1.0.7 | |
Geshi | =1.0.7.1 | |
Geshi | =1.0.7.2 | |
Geshi | =1.0.7.3 | |
Geshi | =1.0.7.4 | |
Geshi | =1.0.7.5 | |
Geshi | =1.0.7.6 | |
Geshi | =1.0.7.7 | |
Geshi | =1.0.7.8 | |
Geshi | =1.0.7.9 | |
Geshi | =1.0.7.10 | |
Geshi | =1.0.7.11 | |
Geshi | =1.0.7.12 | |
Geshi | =1.0.7.13 | |
Geshi | =1.0.7.14 | |
Geshi | =1.0.7.15 | |
Geshi | =1.0.7.16 | |
Geshi | =1.0.7.17 | |
Geshi | =1.0.7.18 | |
Geshi | =1.0.7.19 | |
Geshi | =1.0.7.20 | |
Geshi | =1.0.7.21 | |
Geshi | =1.0.7.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5186 has a disputed severity rating, as the vulnerability allows for potential file inclusion attacks depending on crafted inputs.
To fix CVE-2008-5186, upgrade to GeSHi version 1.0.8.1 or later to mitigate the vulnerability.
CVE-2008-5186 affects all versions of GeSHi prior to 1.0.8.1.
CVE-2008-5186 can enable remote attackers to conduct file inclusion attacks on vulnerable systems.
CVE-2008-5186 is not widely reported as commonly exploited, but it poses a risk due to its potential for file inclusion.