CVE-2008-5204

PowerAward 1.1.0 RC1 - Path Traversal

Title source: llm
STIX 2.1

Description

Multiple directory traversal vulnerabilities in PowerAward 1.1.0 RC1, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the lang parameter to (1) agb.php, (2) angemeldet.php, (3) anmelden.php, (4) charts.php, (5) external_vote.php, (6) guestbook.php, (7) impressum.php, (8) index.php, (9) rss-reader.php, (10) statistic.php, (11) teilnehmer.php, (12) topsites.php, (13) votecode.php, (14) voting.php, and (15) winner.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by CraCkEr · textwebappsphp
https://www.exploit-db.com/exploits/5962

References (3)

Core 3
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29993
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5962
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43463

Scores

EPSS 0.0184
EPSS Percentile 83.1%

Details

CWE
CWE-22
Status published
Products (1)
poweraward/poweraward 1.1.0 rc1
Published Nov 21, 2008
Tracked Since Feb 18, 2026