- Description
- Directory traversal vulnerability in posts.php in SimpleBBS 1.0.6 through 1.1 allows remote attackers to include and execute arbitrary files via ".." sequences in the language cookie, as demonstrated by by injecting the code into the gl_session cookie of users.php, which is stored in error.log.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:simplemedia:simplebbs:1.0.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C22A112-E9E0-4480-9406-9F685D577F98"
},
{
"criteria": "cpe:2.3:a:simplemedia:simplebbs:1.0.7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5D4ED99C-AFBA-485A-BDCC-A43C781F1DA2"
},
{
"criteria": "cpe:2.3:a:simplemedia:simplebbs:1.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "04CFC80A-2F70-4B73-AFDA-C1A524274381"
}
],
"operator": "OR"
}
]
}
]