Description
Directory traversal vulnerability in cgi-bin/koha/mainpage.pl in Koha 3.4 before 3.4.7 and 3.6 before 3.6.1, and LibLime Koha 4.2 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the KohaOpacLanguage cookie to cgi-bin/opac/opac-main.pl, related to Output.pm.
Exploits (1)
References (9)
Core 9
Core References
Patch x_refsource_confirm
https://github.com/liblime/LibLime-Koha/commit/8ea6f7bc37d05a9ec25b5afbea011cf9de5f1e49#C4/Output.pm
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/50812
Various Sources x_refsource_confirm
http://koha-community.org/koha-3-6-1/#more-2929
Exploit x_refsource_misc
http://www.vigasis.com/en/?guncel_guvenlik=LibLime%20Koha%20%3C=%204.2%20Local%20File%20Inclusion%20Vulnerability&lnk=exploits/18153
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18153
Various Sources x_refsource_confirm
http://koha-community.org/koha-3-4-7/#more-2971
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/77322
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/46980
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/71478
Scores
EPSS
0.0779
EPSS Percentile
92.0%
Details
CWE
CWE-22
Status
published
Products (9)
koha/koha
3.06.00.000
koha/koha
3.04.00
koha/koha
3.04.01
koha/koha
3.04.02
koha/koha
3.04.03
koha/koha
3.04.04
koha/koha
3.04.05
koha/koha
3.04.06
koha/liblime_koha
< 4.2
Published
Dec 08, 2011
Tracked Since
Feb 18, 2026