Description
Directory traversal vulnerability in plugins/spaw2/dialogs/dialog.php in BloofoxCMS 0.3.4 allows remote attackers to read arbitrary files via the (1) lang, (2) theme, and (3) module parameters.
Exploits (1)
References (6)
Core 6
Core References
Broken Link vdb-entry
x_refsource_osvdb
http://osvdb.org/51006
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7580
Broken Link, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33135
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4820
Broken Link, Exploit, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33013
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47611
Scores
CVSS v3
8.1
EPSS
0.0910
EPSS Percentile
92.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (1)
bloofox/bloofoxcms
0.3.4
Published
Dec 29, 2008
Tracked Since
Feb 18, 2026