"value":"Directory traversal vulnerability in classes/index.php in Lithium CMS 4.04c and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the siteconf[curl] parameter, as demonstrated by a POST to news/comment.php containing PHP code, which is stored under db/comments/news/ and included by classes/index.php."
},
{
"lang":"es",
"value":"Vulnerabilidad de escalado de directorio en classes/index.php en Lithium CMS 4.04c y anetriores permite a atacantes remotos incluir y ejecutar archivos locales de su elecci\u00f3n mediante un .. (punto punto) en el par\u00e1metro siteconf[curl], com oha sido demostrado por un POST a news/comment.php conteniendo c\u00f3digo PHP, el cual es almacenado en db/comments/news/ e inclu\u00eddo por classes/index.php."