plugins/maps/db_handler.php in LinPHA 1.3.3 and previous versions does not require authentication for a settings action that modifies the configuration file, which allows remote malicious users to conduct directory traversal attacks and execute arbitrary local files by placing directory traversal sequences into the maps_type configuration setting, and then sending a request to maps_view.php, which causes plugins/maps/map.main.class.php to use the modified configuration.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linpha linpha 0.9.1 |
||
linpha linpha 0.9.2 |
||
linpha linpha 0.9.3 |
||
linpha linpha 1.1.1 |
||
linpha linpha 1.2.0 |
||
linpha linpha 0.9.4 |
||
linpha linpha 1.0 |
||
linpha linpha 1.3.0 |
||
linpha linpha 1.3.1 |
||
linpha linpha 1.3.2 |
||
linpha linpha |
||
linpha linpha 0.9.0 |
||
linpha linpha 1.1.0 |