19 lines
1.0 KiB
Markdown
19 lines
1.0 KiB
Markdown
|
|
### [CVE-2012-10034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10034)
|
||
|
|

|
||
|
|

|
||
|
|
&color=brightgreen)
|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
ClanSphere 2011.3 is vulnerable to a local file inclusion (LFI) flaw due to improper handling of the cs_lang cookie parameter. The application fails to sanitize user-supplied input, allowing attackers to traverse directories and read arbitrary files outside the web root. The vulnerability is further exacerbated by null byte injection (%00) to bypass file extension checks.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
- https://www.exploit-db.com/exploits/22181
|
||
|
|
- https://www.vulncheck.com/advisories/clansphere-local-file-inclusion-via-cookie
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/ARPSyndicate/cve-scores
|
||
|
|
|