First published: Fri Jun 13 2014(Updated: )
Multiple directory traversal vulnerabilities in the cssgen contrib module in GeSHi before 1.0.8.11 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) geshi-path or (2) geshi-lang-path parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Geshi | <=1.0.8.10 | |
Geshi | =1.0.8.4 | |
Geshi | =1.0.8.5 | |
Geshi | =1.0.8.6 | |
Geshi | =1.0.8.7 | |
Geshi | =1.0.8.8 | |
Geshi | =1.0.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3521 has a medium severity rating due to its potential for exploitation through directory traversal.
To fix CVE-2012-3521, upgrade the GeSHi module to version 1.0.8.11 or later.
CVE-2012-3521 affects GeSHi versions prior to 1.0.8.11, specifically 1.0.8.4 through 1.0.8.10.
CVE-2012-3521 allows attackers to read arbitrary files on the server due to directory traversal vulnerabilities.
CVE-2012-3521 can be exploited by remote attackers without needing authentication.