CVE-2008-5794 - Path Traversal vulnerability in Lovecms 1.6.2

Publication

2008-12-31

Last modification

2017-09-29

Summary

Directory traversal vulnerability in system/admin/images.php in LoveCMS 1.6.2 Final allows remote attackers to delete arbitrary files via a .. (dot dot) in the delete parameter.

Description

LoveCMS is prone to a vulnerability that allows attackers to delete arbitrary files because it fails to properly sanitize user-supplied input.An attacker can exploit this vulnerability to delete arbitrary files within the context of the webserver process.LoveCMS 1.6.2 is vulnerable; other versions may also be affected.

Solution

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: info@vumetric.com.

Exploit

Attackers can exploit this issue via a browser.The following proof-of-concept URI is available:http://www.example.com/[loveCMS-path]/system/admin/images.php?delete=../../../[local-file]

Classification

CWE-22 - Path Traversal

Risk level (CVSS AV:N/AC:L/Au:N/C:N/I:N/A:P)

Medium

5.0

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Lovecms Lovecms  1.6.2