thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T11:34:47.076Z
Reserved: 2009-04-03T00:00:00
Link: CVE-2008-6592

No data.

Status : Modified
Published: 2009-04-03T18:30:00.377
Modified: 2024-11-21T00:56:56.370
Link: CVE-2008-6592

No data.