![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2009-4116 |
Description: | Multiple directory traversal vulnerabilities in CutePHP CuteNews 1.4.6, when magic_quotes_gpc is disabled, allow remote authenticated users with editor or administrative application access to read arbitrary files via a .. (dot dot) in the source parameter in a (1) list or (2) editnews action to the Editnews module, and (3) the save_con[skin] parameter in the Options module. NOTE: vector 3 can be leveraged for code execution by using a .. to include and execute arbitrary local files. |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-4116 Bugtraq: 20091110 [MORNINGSTAR-2009-02] Multiple security issues in Cute News and UTF-8 Cute News (Google Search) http://www.securityfocus.com/archive/1/507782/100/0/threaded http://www.morningstarsecurity.com/advisories/MORNINGSTAR-2009-02-CuteNews.txt XForce ISS Database: cutenews-editnews-dir-traversal(54246) https://exchange.xforce.ibmcloud.com/vulnerabilities/54246 XForce ISS Database: cutenews-options-file-include(54244) https://exchange.xforce.ibmcloud.com/vulnerabilities/54244 |