Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and previous versions allows remote malicious users to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
spip spip 1.8.2d |
||
spip spip 1.8.2e |
||
spip spip 1.8.2g |