Description
Directory traversal vulnerability in install/help.php in TalkBack 2.3.5, and other versions before 2.3.6.2, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the language parameter.
Exploits (3)
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44018
Exploit, Third Party Advisory x_refsource_misc
http://www.packetstormsecurity.org/0907-exploits/talkback-lfiexec.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30393
Various Sources x_refsource_confirm
http://www.scripts.oldguy.us/talkback/release-notes.html
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6451
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2211/references
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/9095
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4067
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6148
Scores
EPSS
0.0837
EPSS Percentile
92.3%
Details
CWE
CWE-22
Status
published
Products (1)
talkback/talkback
2.3.5
Published
Jul 30, 2008
Tracked Since
Feb 18, 2026