Description
Multiple directory traversal vulnerabilities in ErfurtWiki R1.02b and earlier, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) ewiki_id and (2) ewiki_action parameters to fragments/css.php, and possibly the (3) id parameter to the default URI. NOTE: the default URI is site-specific but often performs an include_once of ewiki.php.
Published: 2008-06-12
Score: 7.5 High
EPSS: 7.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2008-2667 Multiple directory traversal vulnerabilities in ErfurtWiki R1.02b and earlier, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) ewiki_id and (2) ewiki_action parameters to fragments/css.php, and possibly the (3) id parameter to the default URI. NOTE: the default URI is site-specific but often performs an include_once of ewiki.php.
History

No history.

Subscriptions

Erfurtwiki Erfurtwiki
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T09:14:13.468Z

Reserved: 2008-06-11T00:00:00.000Z

Link: CVE-2008-2672

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-06-12T02:32:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-2672

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses