Description
Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Exploits (1)
References (2)
Core 2
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7482
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32850
Scores
EPSS
0.0321
EPSS Percentile
87.1%
Details
CWE
CWE-22
Status
published
Products (1)
apertoblog/apertoblog
0.1.1
Published
Dec 30, 2008
Tracked Since
Feb 18, 2026