First published: Thu Jun 04 2009(Updated: )
Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webspell Webspell | =4.01.02 | |
Webspell Webspell | =4.0.2c | |
Webspell Webspell | =4.1.2 | |
Webspell Webspell | =4.2.0d | |
Webspell Webspell | =4.1 | |
Webspell Webspell | =4.0 | |
Webspell Webspell | =4.01.00 | |
Webspell Webspell | =4.1.1 | |
Webspell Webspell | =4.2.0c | |
Webspell Webspell | =4.01.01 | |
Webspell Webspell | <=4.2.0e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.