First published: Tue Mar 23 2010(Updated: )
Directory traversal vulnerability in codelib/sys/common.inc.php in Phpkobo Free Real Estate Contact Form 1.09, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the LANG_CODE parameter. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phpkobo Free Real Estate Contact Form Script | =1.09 | |
=1.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1062 is considered a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2010-1062, ensure that magic_quotes_gpc is enabled and implement proper input validation to prevent directory traversal.
CVE-2010-1062 is a directory traversal vulnerability that allows attackers to include and execute arbitrary local files.
CVE-2010-1062 is found in Phpkobo Free Real Estate Contact Form version 1.09.
Remote attackers can exploit CVE-2010-1062 by manipulating the LANG_CODE parameter to include malicious files.