CVE-2008-2818

Easy-Clanpage 3.0 b1 - Path Traversal via Section Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2818. PoCs published by Loader007.

AI-analyzed exploit summary This is a writeup describing a Local File Inclusion (LFI) vulnerability in Easy-Clanpage 3.0b1. It outlines steps to exploit the vulnerability by uploading a malicious shell disguised as a JPG file and then including it via a null-byte terminated path.

Description

Directory traversal vulnerability in Easy-Clanpage 3.0 b1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the section parameter to the default URI.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Loader007 · textwebappsphp
https://www.exploit-db.com/exploits/5801

This is a writeup describing a Local File Inclusion (LFI) vulnerability in Easy-Clanpage 3.0b1. It outlines steps to exploit the vulnerability by uploading a malicious shell disguised as a JPG file and then including it via a null-byte terminated path.

Classification
Writeup 90%
Attack Type
Lfi
Complexity
Moderate
Reliability
Reliable
Target: Easy-Clanpage 3.0b1
Auth required
Prerequisites: User account on the target system · Ability to upload a file disguised as an image
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29707
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43073
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5801

Scores

EPSS 0.0330
EPSS Percentile 87.4%

Details

CWE
CWE-22
Status published
Products (1)
easy-clanpage/easy-clanpage 3.0_b1
Published Jun 23, 2008
Tracked Since Feb 18, 2026