FKIE_CVE-2008-5860
Vulnerability from fkie_nvd - Published: 2009-01-06 17:30 - Updated: 2026-04-23 00:35
Severity ?
Summary
Directory traversal vulnerability in backend/template.php in Constructr CMS 3.02.5 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to create or read arbitrary files via directory traversal sequences in the edit_file parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| constructr | constructr-cms | * | |
| constructr | constructr-cms | 3.00.0 | |
| constructr | constructr-cms | 3.00.1 | |
| constructr | constructr-cms | 3.00.2 | |
| constructr | constructr-cms | 3.01.0 | |
| constructr | constructr-cms | 3.01.1 | |
| constructr | constructr-cms | 3.01.2 | |
| constructr | constructr-cms | 3.01.3 | |
| constructr | constructr-cms | 3.01.4 | |
| constructr | constructr-cms | 3.01.5 | |
| constructr | constructr-cms | 3.01.6 | |
| constructr | constructr-cms | 3.01.7 | |
| constructr | constructr-cms | 3.01.8 | |
| constructr | constructr-cms | 3.01.9 | |
| constructr | constructr-cms | 3.02.0 | |
| constructr | constructr-cms | 3.02.1 | |
| constructr | constructr-cms | 3.02.2 | |
| constructr | constructr-cms | 3.02.3 | |
| constructr | constructr-cms | 3.02.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2C54FD3-F2B4-4CF8-898B-2842F835D85D",
"versionEndIncluding": "3.02.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "1F0EC8A6-0487-4DFB-81AF-1EEA412FFCD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.1:alpha:*:*:*:*:*:*",
"matchCriteriaId": "37056EFA-2603-4D92-8739-147D029036C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.00.2:alpha:*:*:*:*:*:*",
"matchCriteriaId": "5E04D2B0-4ACF-483A-8976-33972B2A4185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "52CA7C4F-59C5-4B95-9824-C0268248CF4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "68B8B4AC-AF06-4BB7-B96D-F77E7161CE83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "9A2B90E5-8634-4D57-A140-125A529A7FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "290D1E78-8940-4256-9003-1FC04708521A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "AE01A0E6-246E-48E5-9B17-CB7E2AE5636C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "A0A4BC9B-0B57-40C2-8A73-2DDE52395347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "AB35F6DF-BCFB-4829-A8E2-0B0D8E7E71C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.7:beta:*:*:*:*:*:*",
"matchCriteriaId": "87AA8CC5-B419-4280-84C5-DED823A9A718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.8:beta:*:*:*:*:*:*",
"matchCriteriaId": "9045683D-C074-4271-B482-C7412E61D512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.01.9:beta:*:*:*:*:*:*",
"matchCriteriaId": "0F2FCA30-B101-4FE9-ADBC-3A12D3C665F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE2BD73-09A9-49EA-8C49-5364C5843EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.1:*:*:*:*:*:*:*",
"matchCriteriaId": "71855527-18D0-41C1-B14D-5E5DE554B2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80BED065-8EBF-4272-B10D-D95A8B36162D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C6266966-8355-4565-A0C1-EA4E25EE37E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:constructr:constructr-cms:3.02.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2B41D022-CBC0-4F1E-8ADA-BDAB192F77FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in backend/template.php in Constructr CMS 3.02.5 and earlier, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to create or read arbitrary files via directory traversal sequences in the edit_file parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en backend/template.php en Constructr CMS v3.02.5 y anteriores, cuando est\u00e1 habilitada la opci\u00f3n register_globals y la opci\u00f3n magic_quotes_gpc est\u00e1 deshabilitada, permite a atacantes remotos crear o leer ficheros de su elecci\u00f3n a trav\u00e9s de secuencias de salto de directorio en el par\u00e1metro edit_file."
}
],
"id": "CVE-2008-5860",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-01-06T17:30:00.563",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33250"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/4868"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/7529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/4868"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/7529"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…