- Description
- Directory traversal vulnerability in index.php in vbPortal 3.0.2 through 3.6.0 Beta 1, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the bbvbplang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vbportal:vbportal:3.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E790B9DB-9FDF-4453-9B82-EF26CDF502E2"
},
{
"criteria": "cpe:2.3:a:vbportal:vbportal:3.5.0_beta_2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9F108CB4-03BE-48EF-9750-9BCA8466EB77"
},
{
"criteria": "cpe:2.3:a:vbportal:vbportal:3.5.0_beta_3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "85AE2322-477D-4F7F-BA85-CD2241C4E1A6"
},
{
"criteria": "cpe:2.3:a:vbportal:vbportal:3.5.0_gold:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8A22D54A-E0FC-4B84-AF40-DD5E8D1DFD0A"
},
{
"criteria": "cpe:2.3:a:vbportal:vbportal:3.6.0_beta_1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CE8102A-4746-4220-92F5-E4688A96B189"
}
],
"operator": "OR"
}
]
}
]