Vulnerabilites related to claudio_klingler - quixplorer
Vulnerability from fkie_nvd
Published
2009-06-04 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA7075F8-B97F-4B8D-8BB4-A4990FFA1604", "versionEndIncluding": "1.7.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC860783-7018-4421-8ACE-6F6C522E41DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "21630514-7C0A-4B74-8E3A-4F32F9366EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "C5E4CEDD-095B-40E1-9AD5-419CC63CAA50", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "50C5722B-0221-4CE2-84E9-C4A6007DFB5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "634AAE01-C70F-4B79-9FFB-E902AED7A6DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "0D2F0E0E-D32E-49C0-8710-B93E9D825925", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "91115B08-3533-4027-B80A-3CDFDC38A915", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFE1A1DE-DD29-4A96-B483-1CA2B5AA59F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "1F0C7694-9978-4F85-8B81-A5AA558780BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3a:*:*:*:*:*:*:*", "matchCriteriaId": "26CDEB37-98C9-42AD-BC50-415FEF0E5943", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3b:*:*:*:*:*:*:*", "matchCriteriaId": "C5A20998-E0B8-4AA4-9525-16451E163EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.3c:*:*:*:*:*:*:*", "matchCriteriaId": "4F8E7335-EEA2-42AB-BFB3-D2F00303419F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.04:*:*:*:*:*:*:*", "matchCriteriaId": "D3EE4A5E-DE0F-45E1-8950-53A1C35AEF15", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FEF8C28C-3AE4-4031-949A-B120097B93EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "08EB1FD6-A790-40D0-A931-EAD9983D983C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3E6D0D3-10F2-4D8C-BC26-BA4AB513B33B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "16028F35-AE2B-4C10-96C5-8C3ABBD59B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "372DA1CA-691A-4510-9ECE-86B4914ABE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E99F2224-6DF4-4E8F-B5AD-6D474C4F27D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "99C0289F-F5D6-46D1-9D5F-4BBB7762E396", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "864C47CE-7BE4-4927-83F1-F563C3E12034", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "04274BC9-E353-4FD9-8BB6-7F431453B95C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9BA5727-3AD1-4169-8E94-231BD2CAFD24", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.05:*:*:*:*:*:*:*", "matchCriteriaId": "73AD8BD9-03BB-4E89-9D4D-50D095C38F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7468212F-EB58-4E20-888B-679D4242AC6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.1_15.08.2006:*:*:*:*:*:*:*", "matchCriteriaId": "9D00E3AF-4649-4AE6-AD50-1166BC89FC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.0.2_17.08.2006:*:*:*:*:*:*:*", "matchCriteriaId": "4B0E1423-82D3-42E8-B90E-E0A2DECF9948", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.1_03.09.2006:*:*:*:*:*:*:*", "matchCriteriaId": "511C256A-649F-47AD-88A7-4DF6CCAB4DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.1_20.09.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "A35930C6-663F-49A8-9C05-5F9CC985ABE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2.2_21.09.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "19C91295-E4A9-45B8-916F-7A34BF553611", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.2_17.09.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "0028B129-B45A-46A8-BD09-D3F8B383B9C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.1_11.10.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "A1B7DE42-BE41-4827-966F-BFE294CD9F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3.2_12.10.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "2D2C36F4-9F45-4E37-923A-5A3650132997", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.3_08.10.2006_1000:*:*:*:*:*:*:*", "matchCriteriaId": "F324A21B-69A7-4618-BB0B-0A5BF85A8655", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.4_13.10.2006:*:*:*:*:*:*:*", "matchCriteriaId": "B2772FF4-E46F-4859-B7B1-BA1E2966BEBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.5.5_30.10.2006_2200:*:*:*:*:*:*:*", "matchCriteriaId": "660D356C-164C-47DA-8DB4-9E45DD876FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "080E4F0F-16E8-402F-9A11-2326469D65C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "FEC23AAE-37F6-4842-9BB7-E46BB6348B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "48F8B14D-F020-4C93-A9A6-EEBF14A910B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2FFFABF7-960A-4BB9-BCCC-C7CB4FCEA946", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.6.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "09EE1C8F-F520-4E77-BF1E-CDFC4F33FD5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB1A7E5B-A04E-48E2-8761-11C8661C1D3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8412E8AF-BDB8-4DCF-AFEA-E3E69F37DC0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.2-18.04.2008:*:*:*:*:*:*:*", "matchCriteriaId": "9B77756A-09FA-4B82-BF4F-FB15EEB66F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3-12.05.2008:*:*:*:*:*:*:*", "matchCriteriaId": "153B15B9-280D-437A-B605-73879A0A1CCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "12116393-BFD8-473F-956F-5F6C0B27C63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "363CC2F1-493E-42EB-ABF5-AECBBAEE64DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "1591D7EE-1188-4EF4-8271-00B1F54EC92A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "6546FC7A-5392-4741-B942-EACC360C958D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "3E0B254B-F9CF-4484-B7BE-331D009DDDFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "E3CCB8A7-BA0E-46AF-90FC-C2AE98A570F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "754912C5-01EF-4F98-9AF7-FFC4FEC5A5C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1E3FAC1D-008A-4088-86EC-8A96DBDA8614", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "0EFCC874-3498-4F1A-8B51-DCA83B4C2B80", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "38D8EFE9-B6A9-44BC-9041-2E1CCE8FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tinywebgallery:tinywebgallery:1.7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D30C4A2A-6759-474C-82EC-FFD97BFCEA1A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE67329A-7862-470A-AF78-DA135587E442", "versionEndIncluding": "2.3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "3907B16C-0DEC-40AE-BB6F-5E6317E083BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D221E893-172F-49F7-BA83-149F88BADB7C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en .include/init.php (tambi\u00e9n conocido como admin/_include/init.php) en QuiXplorer v2.3.2 y anteriores, utilizado en TinyWebGallery v1.7.6 y anteriores, permite a los atacantes remotos, incluir y ejecutar arbitrariamente archivos locales a trav\u00e9s de ..(punto punto) en el par\u00e1metro \"lang\" para admin/index.php." } ], "id": "CVE-2009-1911", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-04T16:30:00.467", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35020" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35060" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/34892" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/8649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/34892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8649" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-25 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
claudio_klingler | quixplorer | * | |
claudio_klingler | quixplorer | 1.0 | |
claudio_klingler | quixplorer | 1.1 | |
claudio_klingler | quixplorer | 1.2 | |
claudio_klingler | quixplorer | 1.4 | |
claudio_klingler | quixplorer | 1.5 | |
claudio_klingler | quixplorer | 1.6 | |
claudio_klingler | quixplorer | 2.0 | |
claudio_klingler | quixplorer | 2.1.1 | |
claudio_klingler | quixplorer | 2.2 | |
mads_brunn | t3quixplorer | 1.0.0 | |
mads_brunn | t3quixplorer | 1.0.1 | |
mads_brunn | t3quixplorer | 1.0.2 | |
mads_brunn | t3quixplorer | 1.2.0 | |
mads_brunn | t3quixplorer | 1.3.0 | |
mads_brunn | t3quixplorer | 1.4.0 | |
mads_brunn | t3quixplorer | 1.5.0 | |
mads_brunn | t3quixplorer | 1.6.0 | |
mads_brunn | t3quixplorer | 1.7.0 | |
mads_brunn | t3quixplorer | 1.7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FBDE35-7E96-4CB0-AA02-20A54E25C034", "versionEndIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "BE727C14-8517-4996-8D34-FAF238CB3429", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "03A9826B-068A-4923-B3C7-02EA3C732038", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C03C88C-5D51-4720-90C8-EDFF288702AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E8B77C9D-C67F-4D46-928F-50811DEF43F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D26478C-CF65-43D7-81F9-A2EB14F94689", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3B9A49E-17E4-4118-8AB4-B42259123E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A423F65-9148-4393-BB29-0BCB72557C83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "13CB2420-FEDA-41E7-B650-84C71BFC0EAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8995BEFE-4E47-47ED-88DA-3BA06D4B2392", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory." }, { "lang": "es", "value": "Vulnerabilidad de subida no restringida de ficheros en QuiXplorer v2.3 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable usando la opci\u00f3n de subir en index.php, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado" } ], "id": "CVE-2011-5005", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-25T01:55:04.523", "references": [ { "source": "cve@mitre.org", "url": "http://www.exploit-db.com/exploits/18118" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploit-db.com/exploits/18118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2011-5005 (GCVE-0-2011-5005)
Vulnerability from cvelistv5
Published
2011-12-25 01:00
Modified
2024-08-07 00:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:39.630Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18118", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18118" }, { "name": "quixplorer-index-file-upload(71323)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18118", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18118" }, { "name": "quixplorer-index-file-upload(71323)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18118", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18118" }, { "name": "quixplorer-index-file-upload(71323)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5005", "datePublished": "2011-12-25T01:00:00", "dateReserved": "2011-12-24T00:00:00", "dateUpdated": "2024-08-07T00:23:39.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-1911 (GCVE-0-2009-1911)
Vulnerability from cvelistv5
Published
2009-06-04 16:00
Modified
2024-08-07 05:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:27:54.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35060" }, { "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded" }, { "name": "35020", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35020" }, { "name": "tinywebgallery-init-file-include(50408)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653" }, { "name": "34892", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34892" }, { "name": "8649", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8649" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35060", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35060" }, { "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded" }, { "name": "35020", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35020" }, { "name": "tinywebgallery-init-file-include(50408)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653" }, { "name": "34892", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34892" }, { "name": "8649", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8649" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1911", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in .include/init.php (aka admin/_include/init.php) in QuiXplorer 2.3.2 and earlier, as used in TinyWebGallery (TWG) 1.7.6 and earlier, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter to admin/index.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35060", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35060" }, { "name": "20090510 TinyWebGallery \u003c= 1.7.6 LFI / Remote Code Execution Exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503396/100/0/threaded" }, { "name": "35020", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35020" }, { "name": "tinywebgallery-init-file-include(50408)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50408" }, { "name": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653", "refsource": "CONFIRM", "url": "http://www.tinywebgallery.com/forum/viewtopic.php?t=1653" }, { "name": "34892", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34892" }, { "name": "8649", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8649" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1911", "datePublished": "2009-06-04T16:00:00", "dateReserved": "2009-06-04T00:00:00", "dateUpdated": "2024-08-07T05:27:54.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }