First published: Tue Mar 23 2010(Updated: )
Multiple directory traversal vulnerabilities in Phpkobo Free Real Estate Contact Form 1.09, when magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the LANG_CODE parameter to (1) codelib/cfg/common.inc.php, (2) form/app/common.inc.php, and (3) staff/app/common.inc.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phpkobo Free Real Estate Contact Form Script | =1.09 | |
=1.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1063 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2010-1063, update to a patched version of Phpkobo Free Real Estate Contact Form or ensure that magic_quotes_gpc is enabled.
CVE-2010-1063 affects the Phpkobo Free Real Estate Contact Form version 1.09.
The risks associated with CVE-2010-1063 include remote attackers being able to execute arbitrary local files on the server.
Attackers can exploit CVE-2010-1063 by using directory traversal sequences in the LANG_CODE parameter to access sensitive files.