CVE-2008-5860
Published Jan 6, 2009
Last updated 7 years ago
Overview
- Description
- Directory traversal vulnerability in backend/template.php in Constructr CMS 3.02.5 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to create or read arbitrary files via directory traversal sequences in the edit_file parameter.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:constructr:constructr-cms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2C54FD3-F2B4-4CF8-898B-2842F835D85D", "versionEndIncluding": "3.02.5" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.0:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F0EC8A6-0487-4DFB-81AF-1EEA412FFCD1" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.1:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37056EFA-2603-4D92-8739-147D029036C1" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.2:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E04D2B0-4ACF-483A-8976-33972B2A4185" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52CA7C4F-59C5-4B95-9824-C0268248CF4E" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.1:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68B8B4AC-AF06-4BB7-B96D-F77E7161CE83" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.2:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A2B90E5-8634-4D57-A140-125A529A7FBA" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "290D1E78-8940-4256-9003-1FC04708521A" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE01A0E6-246E-48E5-9B17-CB7E2AE5636C" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.5:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0A4BC9B-0B57-40C2-8A73-2DDE52395347" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.6:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB35F6DF-BCFB-4829-A8E2-0B0D8E7E71C0" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.7:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87AA8CC5-B419-4280-84C5-DED823A9A718" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.8:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9045683D-C074-4271-B482-C7412E61D512" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.9:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F2FCA30-B101-4FE9-ADBC-3A12D3C665F8" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECE2BD73-09A9-49EA-8C49-5364C5843EB3" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71855527-18D0-41C1-B14D-5E5DE554B2C8" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80BED065-8EBF-4272-B10D-D95A8B36162D" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6266966-8355-4565-A0C1-EA4E25EE37E1" }, { "criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B41D022-CBC0-4F1E-8ADA-BDAB192F77FD" } ], "operator": "OR" } ] } ]