Directory traversal vulnerability in plugins/ddb/foot.php in Strawberry 1.1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the file parameter to example/index.php. NOTE: this was originally reported as an issue affecting the do parameter, but traversal with that parameter might depend on a modified example/index.php. NOTE: some of these details are obtained from third party information.
References
Configurations
History
No history.
Information
Published : 2009-05-22 18:30
Updated : 2017-09-29 01:34
NVD link : CVE-2009-1774
Mitre link : CVE-2009-1774
CVE.ORG link : CVE-2009-1774
JSON object : View
Products Affected
strawberry
- strawberry
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')