Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-6172

EPSS 5.39% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2008-6172

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Weberr RWCards 'captcha_image.php'本地文件包含漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
RWCards是Joomla!的电子卡片组件。 RWCards (com_rwcards) 3.0.11组件的captcha/captcha_image.php中存在目录遍历漏洞,当magic_quotes_gpc被中止时,远程攻击者可以借助img参数zhogn的目录遍历序列,包含和运行任意本地文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2008-6172

#POC DescriptionSource LinkShenlong Link
1A directory traversal vulnerability in captcha/captcha_image.php in the RWCards (com_rwcards) 3.0.11 component for Joomla! when magic_quotes_gpc is disabled allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the img parameter.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2008/CVE-2008-6172.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2008-6172

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-02-19 · 32 CVEs total

CVE-2008-6179IndexScript "sug_cat.php" SQL注入漏洞
CVE-2008-6194Microsoft Windows DNS服务器 内存泄露漏洞
CVE-2008-6193Sam Crew MyBlog 'cleartext'敏感信息泄露漏洞
CVE-2008-6192Sun Java System Portal Server Portlets 跨站脚本攻击漏洞
CVE-2008-6191IntrinsicSWIMAGE Encore Master 'Conductor.exe'密码信息泄露漏洞
CVE-2008-6190Eeb-WeltEEBCMS 'index.php'跨站脚本攻击漏洞
CVE-2008-6189Gforge 多个脚本SQL注入漏洞
CVE-2008-6188Gforge 脚本editprofile.php SQL注入漏洞
CVE-2008-6187Gforge 脚本shownotes.php SQL注入漏洞
CVE-2008-6186RaidenFTPD MLST命令远程栈溢出漏洞
CVE-2008-6185NoticeWare Email Server NG 'PASS'命令拒绝服务漏洞
CVE-2008-6184Medialab-Karlsruhe OwnBiblio组件'index.php' SQL注入漏洞
CVE-2008-6183My PHP Indexer 'index.php'目录遍历漏洞
CVE-2008-6182Joomla! Ignite Gallery "index.php" SQL注入漏洞
CVE-2008-6181Mad4Media Mad4Joomla Mailforms组件'ndex.php' SQL注入漏洞
CVE-2008-6180NewLife Blogger "nlb3" Cookie SQL注入漏洞
CVE-2008-6165Easy-Script CS-Partner "gestion.php" 多个SQL注入漏洞
CVE-2009-0648Falt4 CMS RC "admin/index.php" 跨站请求伪造漏洞
CVE-2009-0647Microsoft Windows Live Messenger字符集数据远程拒绝服务漏洞
CVE-2008-6178FCKeditor connector.php任意文件上传漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2008-6172

No comments yet


Leave a comment