Description
Directory traversal vulnerability in lib/translation.functions.php in CMS Made Simple before 1.8.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the default_cms_lang parameter to an admin script, as demonstrated by admin/addbookmark.php, a different vulnerability than CVE-2008-5642.
Remediation
Update to CMS Made Simple 1.8.1 or later.
References
https://www.cmsmadesimple.org/2010/07/3/announcing-cms-made-simple-1-8-1-mankara/
https://www.cvedetails.com/cve/CVE-2010-2797/
http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html
Related Vulnerabilities
WordPress 5.4.x Directory Traversal (5.4 - 5.4.15)
WordPress Plugin WP Cost Estimation & Payment Forms Builder Directory Traversal (9.659)
WordPress Plugin S3Bubble Cloud Video With Adverts & Analytics Arbitrary File Download (0.7)
WordPress Plugin SEO Tools 'file' Parameter Directory Traversal (3.1.7)