{ "schema_version": "1.4.0", "id": "GHSA-m93x-gmx9-p93r", "modified": "2022-05-17T00:37:40Z", "published": "2022-05-17T00:37:40Z", "aliases": [ "CVE-2008-6877" ], "details": "** DISPUTED ** Directory traversal vulnerability in admin/includes/initsystem.php in Zen Cart 1.3.8 and 1.3.8a, when .htaccess is not supported, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the loader_file parameter. NOTE: the vendor disputes this issue, stating \"at worst, the use of this vulnerability will reveal some local file paths.\"", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6877" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/6038" }, { "type": "WEB", "url": "http://osvdb.org/46912" }, { "type": "WEB", "url": "http://secunia.com/advisories/31039" }, { "type": "WEB", "url": "http://www.attrition.org/pipermail/vim/2008-July/002028.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/30179" }, { "type": "WEB", "url": "http://www.zen-cart.com/forum/showthread.php?t=102802" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-07-27T14:30:00Z" } }