ClanSphere 2011.3 is vulnerable to a local file inclusion (LFI) flaw due to improper handling of the cs_lang cookie parameter. The application fails to sanitize user-supplied input, allowing attackers to traverse directories and read arbitrary files outside the web root. The vulnerability is further exacerbated by null byte injection (%00) to bypass file extension checks.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/clansphere_traversal.rb | Exploit Third Party Advisory |
| https://sourceforge.net/projects/clansphere/ | Product |
| https://www.exploit-db.com/exploits/22181 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/clansphere-local-file-inclusion-via-cookie | Third Party Advisory |
| https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/clansphere_traversal.rb | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/22181 | Exploit VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-05 20:15
Updated : 2025-09-23 18:46
NVD link : CVE-2012-10034
Mitre link : CVE-2012-10034
CVE.ORG link : CVE-2012-10034
JSON object : View
Products Affected
csphere
- clansphere
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
