Description
Multiple directory traversal vulnerabilities in CMS Chainuk 1.2 and earlier allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the menu parameter to admin/admin_menu.php, and the id parameter to (2) index.php and (3) admin/admin_edit.php; and (4) delete arbitrary local files via a .. (dot dot) in the id parameter to admin/admin_delete.php. NOTE: vector 2 can be leveraged for static code injection by sending a crafted menu parameter to admin/admin_menu.php, and then sending an id=../menu.csv request to index.php.
Exploits (1)
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/55666
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9069
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/55668
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/55669
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/55667
Scores
EPSS
0.0151
EPSS Percentile
81.3%
Details
CWE
CWE-22
Status
published
Products (1)
cms.tut.su/cms_chainuk
< 1.2
Published
Jul 05, 2009
Tracked Since
Feb 18, 2026