{ "schema_version": "1.4.0", "id": "GHSA-rrcf-jjfc-28h5", "modified": "2022-05-01T23:44:15Z", "published": "2022-05-01T23:44:15Z", "aliases": [ "CVE-2008-1856" ], "details": "plugins/maps/db_handler.php in LinPHA 1.3.3 and earlier does not require authentication for a settings action that modifies the configuration file, which allows remote attackers to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1856" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41676" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/5392" }, { "type": "WEB", "url": "http://secunia.com/advisories/29724" }, { "type": "WEB", "url": "http://sourceforge.net/project/shownotes.php?release_id=595725" }, { "type": "WEB", "url": "http://www.osvdb.org/50229" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28654" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1136" } ], "database_specific": { "cwe_ids": [ "CWE-20", "CWE-22" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-04-16T19:05:00Z" } }