Description
Directory traversal vulnerability in languages.inc.php in DynPG CMS 4.1.1 and 4.2.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the CHG_DYNPG_SET_LANGUAGE parameter to index.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/15646
References (7)
Core 7
Core References
Patch x_refsource_confirm
http://www.dynpg.org/cms-freeware_en.php?t=DynPG+Update+4.2.1+Security+Update&read_article=226
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/45115
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/42380
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/69539
Exploit x_refsource_misc
http://packetstormsecurity.org/files/view/96230/dynpg-lfisqldisclose.txt
Exploit x_refsource_misc
http://www.htbridge.ch/advisory/lfi_in_dynpg.html
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15646
Scores
EPSS
0.0744
EPSS Percentile
91.8%
Details
CWE
CWE-22
Status
published
Products (2)
dynpg/dynpg
4.1.1
dynpg/dynpg
4.2.0
Published
Dec 06, 2010
Tracked Since
Feb 18, 2026