First published: Thu Jul 02 2009(Updated: )
Directory traversal vulnerability in data/modules/blog/module_pages_site.php in Pluck 4.6.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the post parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pluck CMS | =4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6842 is classified as a medium severity vulnerability due to its potential to allow unauthorized file inclusion.
To fix CVE-2008-6842, upgrade to a later version of Pluck CMS that addresses this vulnerability.
CVE-2008-6842 affects users of Pluck CMS version 4.6.1.
CVE-2008-6842 utilizes directory traversal techniques through the post parameter to include arbitrary local files.
Exploiting CVE-2008-6842 could result in remote attackers executing arbitrary code on the vulnerable system.