Vulnerabilities > CVE-2005-4319 - Unspecified vulnerability in Limbo CMS Limbo CMS
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
Directory traversal vulnerability in index2.php in Limbo CMS 1.0.4.2 and earlier allows remote attackers to include arbitrary PHP files via ".." sequences in the option parameter.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Limbo CMS 1.0.4 .2 index2.php option Parameter Traversal Arbitrary File Access. CVE-2005-4319. Webapps exploit for php platform |
id | EDB-ID:26837 |
last seen | 2016-02-03 |
modified | 2005-12-14 |
published | 2005-12-14 |
reporter | rgod |
source | https://www.exploit-db.com/download/26837/ |
title | Limbo CMS 1.0.4.2 - index2.php option Parameter Traversal Arbitrary File Access |
Nessus
NASL family | CGI abuses |
NASL id | LIMBO_MULTIPLE_FLAWS.NASL |
description | The remote host is running Limbo CMS, a content-management system written in PHP. The remote version of this software is vulnerable to several flaws including : - If register_globals is off and Limbo is configured to use a MySQL backend, then a SQL injection is possible due to improper sanitization of the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20824 |
published | 2006-01-30 |
reporter | This script is Copyright (C) 2006-2018 Josh Zlatin-Amishav |
source | https://www.tenable.com/plugins/nessus/20824 |
title | Limbo CMS Multiple Vulnerabilities |
code |
|
References
- http://rgod.altervista.org/limbo1042_xpl.html
- http://secunia.com/advisories/18063/
- http://securityreason.com/securityalert/255
- http://securitytracker.com/id?1015364
- http://www.osvdb.org/21755
- http://www.securityfocus.com/archive/1/419470/100/0/threaded
- http://www.securityfocus.com/bid/15871/
- http://www.vupen.com/english/advisories/2005/2932