Overview
- Description
- thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lightneasy:lightneasy:1.2.2:*:no_database:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F76F72FB-D3CE-4229-93B1-FE0A021972B0" }, { "criteria": "cpe:2.3:a:sqlite:sqlite:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65EA4824-622E-4A2E-969F-05AF2C5B1F8C" } ], "operator": "OR" } ] } ]