First published: Thu Jun 04 2009(Updated: )
Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Webspell | =4.01.02 | |
Webspell | =4.0.2c | |
Webspell | =4.1.2 | |
Webspell | =4.2.0d | |
Webspell | =4.1 | |
Webspell | =4.0 | |
Webspell | =4.01.00 | |
Webspell | =4.1.1 | |
Webspell | =4.2.0c | |
Webspell | =4.01.01 | |
Webspell | <=4.2.0e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1912 is considered a high severity vulnerability due to its ability to allow remote attackers to execute arbitrary local .php files.
To fix CVE-2009-1912, users should upgrade to webSPELL version 4.2.0f or later where the vulnerability has been patched.
CVE-2009-1912 affects webSPELL versions up to 4.2.0e, specifically versions 4.0, 4.1, and 4.2.0.
Yes, CVE-2009-1912 can be leveraged for SQL injection by including specific files like awards.php.
The attack vector for CVE-2009-1912 involves exploiting a directory traversal vulnerability through a specially crafted language cookie.