CWE
22
Advisory Published
Updated

CVE-2008-6884: Path Traversal

First published: Fri Jul 31 2009(Updated: )

Multiple directory traversal vulnerabilities in XOOPS 2.3.1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xoopsConfig[language] parameter to (1) blocks.php and (2) main.php in xoops_lib/modules/protector/.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Xoops Xm Memberstats=2.3.1
Xoops=2.3.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2008-6884?

    CVE-2008-6884 is considered a high severity vulnerability due to its potential for arbitrary file inclusion.

  • How do I fix CVE-2008-6884?

    To fix CVE-2008-6884, disable register_globals and upgrade to a patched version of XOOPS.

  • Who is affected by CVE-2008-6884?

    CVE-2008-6884 affects users of XOOPS version 2.3.1 with register_globals enabled.

  • What kind of attacks can be executed using CVE-2008-6884?

    Using CVE-2008-6884, attackers can perform directory traversal attacks to include and execute arbitrary local files.

  • Is CVE-2008-6884 still a risk for current versions of XOOPS?

    CVE-2008-6884 primarily impacts version 2.3.1, and newer versions of XOOPS have addressed this vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203