VYPR
Moderate severityNVD Advisory· Published Feb 24, 2012· Updated Apr 29, 2026

CVE-2012-1207

CVE-2012-1207

Description

Directory traversal vulnerability in frontend/core/engine/javascript.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the module parameter to frontend/js.php.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
forkcms/forkcmsPackagist
< 3.2.53.2.5

Affected products

1

Patches

1
a9986b86c53d

XSS / LFI Fox

https://github.com/forkcms/forkcmsFrederik HeyninckFeb 13, 2012via ghsa
1 file changed · +11 0
  • frontend/core/engine/javascript.php+11 0 modified
    @@ -194,6 +194,17 @@ private function setLanguage($value)
     	 */
     	private function setModule($value)
     	{
    +		$modules = (array) FrontendModel::getModules();
    +		
    +		if(!in_array((string) $value, $modules))
    +		{
    +			// when debug is on throw an exception
    +			if(SPOON_DEBUG) throw new FrontendException('Invalid file.');
    +
    +			// when debug is of show a descent message
    +			else exit(SPOON_DEBUG_MESSAGE);
    +		}
    +		
     		$this->module = (string) $value;
     	}
     }
    

Vulnerability mechanics

Synthesis attempt was rejected by the grounding validator. Re-run pending.

References

8

News mentions

0

No linked articles in our index yet.