Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5186

Опубликовано: 21 нояб. 2008
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5

Описание

The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

gutsy

ignored

end of life, was needs-triage
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

not-affected

0.0.20080505-5
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

ignored

end of life, was needs-triage
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

not-affected

1.0.8.1-1
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

gutsy

ignored

end of life, was needs-triage
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

not-affected

1.0-1.2
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

Показывать по

Ссылки на источники

7.5 High

CVSS2

Связанные уязвимости

nvd
около 17 лет назад

The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path

debian
около 17 лет назад

The set_language_path function in geshi.php in Generic Syntax Highligh ...

github
больше 3 лет назад

** DISPUTED ** The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before 1.0.8.1 might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path.

7.5 High

CVSS2