Description
Multiple directory traversal vulnerabilities in LoveCMS 1.4 allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the step parameter to install/index.php or (2) the load parameter to the top-level URI.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsphp
https://www.exploit-db.com/exploits/29637
exploitdb
WRITEUP
VERIFIED
by laurent gaffie · textwebappsphp
https://www.exploit-db.com/exploits/29638
References (6)
Core 6
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2338
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33517
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/33518
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22675
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0716
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/460917/100/0/threaded
Scores
EPSS
0.0467
EPSS Percentile
89.4%
Details
CWE
CWE-22
Status
published
Products (1)
lovecms/lovecms
1.4
Published
Mar 02, 2007
Tracked Since
Feb 18, 2026