First published: Tue Dec 30 2008(Updated: )
Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apertoblog | =0.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5776 has a medium severity rating due to its impact on the confidentiality and integrity of the system.
To fix CVE-2008-5776, upgrade Aperto Blog to version 0.1.2 or later where the vulnerability is addressed.
Exploitation of CVE-2008-5776 may allow remote attackers to execute arbitrary local files, potentially leading to unauthorized access or data loss.
CVE-2008-5776 affects Aperto Blog version 0.1.1 specifically.
Preventing attacks related to CVE-2008-5776 includes applying security updates and employing web application firewalls to filter malicious requests.