Description
Directory traversal vulnerability in index2.php in Limbo CMS 1.0.4.2 and earlier allows remote attackers to include arbitrary PHP files via ".." sequences in the option parameter.
Exploits (1)
References (8)
Core 8
Core References
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18063/
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015364
Exploit, Vendor Advisory x_refsource_misc
http://rgod.altervista.org/limbo1042_xpl.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/255
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21755
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15871/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/419470/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2932
Scores
EPSS
0.1439
EPSS Percentile
94.4%
Details
Status
published
Products (1)
limbo_cms/limbo_cms
< 1.0.4.2
Published
Dec 17, 2005
Tracked Since
Feb 18, 2026