CVE-2008-5776

Aperto Blog 0.1.1 - Path Traversal

Title source: llm
STIX 2.1

Description

Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.

Exploits (1)

exploitdb WRITEUP VERIFIED
by NoGe · textwebappsphp
https://www.exploit-db.com/exploits/7482

References (2)

Core 2
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7482
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32850

Scores

EPSS 0.0321
EPSS Percentile 87.1%

Details

CWE
CWE-22
Status published
Products (1)
apertoblog/apertoblog 0.1.1
Published Dec 30, 2008
Tracked Since Feb 18, 2026