Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and previous versions allows remote malicious users to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
webspell webspell |
||
webspell webspell 4.1.2 |
||
webspell webspell 4.1.1 |
||
webspell webspell 4.2.0c |
||
webspell webspell 4.2.0d |
||
webspell webspell 4.0.2c |
||
webspell webspell 4.0 |
||
webspell webspell 4.01.01 |
||
webspell webspell 4.01.00 |
||
webspell webspell 4.1 |
||
webspell webspell 4.01.02 |