Description
Directory traversal vulnerability in autoinstall4imagesgalleryupgrade.php in the Fantastico De Luxe Module for cPanel allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the scriptpath_show parameter in a GoAhead action. NOTE: this issue only crosses privilege boundaries when security settings such as disable_functions and safe_mode are active, since exploitation requires uploading of executable code to a home directory.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Khashayar Fereidani · textwebappsphp
https://www.exploit-db.com/exploits/6897
References (9)
Core 9
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32016
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/498526
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/498529/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46252
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6897
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/498519
Various Sources x_refsource_confirm
http://www.netenberg.com/forum/index.php?topic=6832
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/498529
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/497964/100/0/threaded
Scores
EPSS
0.0558
EPSS Percentile
90.3%
Details
CWE
CWE-22
Status
published
Products (1)
netenberg/fantastico_de_luxe
Published
Aug 10, 2009
Tracked Since
Feb 18, 2026