### [CVE-2012-10034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10034) ![](https://img.shields.io/static/v1?label=Product&message=ClanSphere&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2011.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brightgreen) ### Description ClanSphere 2011.3 is vulnerable to a local file inclusion (LFI) flaw due to improper handling of the cs_lang cookie parameter. The application fails to sanitize user-supplied input, allowing attackers to traverse directories and read arbitrary files outside the web root. The vulnerability is further exacerbated by null byte injection (%00) to bypass file extension checks. ### POC #### Reference - https://www.exploit-db.com/exploits/22181 - https://www.vulncheck.com/advisories/clansphere-local-file-inclusion-via-cookie #### Github - https://github.com/ARPSyndicate/cve-scores