First published: Mon Nov 30 2009(Updated: )
Multiple directory traversal vulnerabilities in CutePHP CuteNews 1.4.6, when magic_quotes_gpc is disabled, allow remote authenticated users with editor or administrative application access to read arbitrary files via a .. (dot dot) in the source parameter in a (1) list or (2) editnews action to the Editnews module, and (3) the save_con[skin] parameter in the Options module. NOTE: vector 3 can be leveraged for code execution by using a .. to include and execute arbitrary local files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CutePHP CuteNews | =1.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4116 is classified as a high severity vulnerability due to its impact on file access for authenticated users.
To fix CVE-2009-4116, you should upgrade to a version of CuteNews that has addressed this vulnerability.
CVE-2009-4116 affects authenticated users with editor or administrative access on CuteNews version 1.4.6.
CVE-2009-4116 allows attackers to exploit directory traversal to read arbitrary files on the server.
CuteNews version 1.4.6 is the specific version that is vulnerable to CVE-2009-4116.