CVE-2010-4399

Dynpg - Path Traversal

Title source: rule
STIX 2.1

Description

Directory traversal vulnerability in languages.inc.php in DynPG CMS 4.1.1 and 4.2.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the CHG_DYNPG_SET_LANGUAGE parameter to index.php. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/15646

References (7)

Core 7
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/45115
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42380
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/69539
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/15646

Scores

EPSS 0.0744
EPSS Percentile 91.8%

Details

CWE
CWE-22
Status published
Products (2)
dynpg/dynpg 4.1.1
dynpg/dynpg 4.2.0
Published Dec 06, 2010
Tracked Since Feb 18, 2026