Directory traversal vulnerability in src/func/language.php in webSPELL 4.2.0e and earlier allows remote attackers to include and execute arbitrary local .php files via a .. (dot dot) in a language cookie. NOTE: this can be leveraged for SQL injection by including awards.php.
2009-06-04T16:30:00.483
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | webspell | webspell | ≤ 4.2.0e | Yes |
Application | webspell | webspell | 4.0 | Yes |
Application | webspell | webspell | 4.0.2c | Yes |
Application | webspell | webspell | 4.1 | Yes |
Application | webspell | webspell | 4.01.00 | Yes |
Application | webspell | webspell | 4.1.1 | Yes |
Application | webspell | webspell | 4.01.01 | Yes |
Application | webspell | webspell | 4.01.02 | Yes |
Application | webspell | webspell | 4.1.2 | Yes |
Application | webspell | webspell | 4.2.0c | Yes |
Application | webspell | webspell | 4.2.0d | Yes |