Description
Directory traversal vulnerability in modules/hayoo/index.php in Tribisur 2.1, 2.0, and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary files via directory traversal sequences in the theme parameter. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by cr4wl3r · textwebappsphp
https://www.exploit-db.com/exploits/11655
References (4)
Core 4
Core References
Exploit x_refsource_misc
http://packetstormsecurity.org/1003-exploits/tribisur-lfi.txt
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28362
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11655
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38596
Scores
EPSS
0.0192
EPSS Percentile
83.4%
Details
CWE
CWE-22
Status
published
Products (2)
thomas_perez/tribisur
2.0
thomas_perez/tribisur
< 2.1
Published
Mar 10, 2010
Tracked Since
Feb 18, 2026