Vulnerability Name: | CVE-2007-2369 (CCN-33475) | ||||||||
Assigned: | 2007-04-05 | ||||||||
Published: | 2007-04-05 | ||||||||
Updated: | 2017-10-11 | ||||||||
Summary: | Directory traversal vulnerability in picture.php in WebSPELL 4.01.02 and earlier, when PHP before 4.3.0 is used, allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter. Successful exploitation requires that PHP before 4.3.0 is used. | ||||||||
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
6.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:H/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: webSPELL Web site webSPELL.org - Free Gaming CMS Source: MITRE Type: CNA CVE-2007-2368 Source: MITRE Type: CNA CVE-2007-2369 Source: OSVDB Type: UNKNOWN 34638 Source: CCN Type: SA24712 WebSPELL "picture.php" Information Disclosure Source: CCN Type: OSVDB ID: 34637 webSPELL picture.php file Variable Direct Request Arbitrary File Access Source: CCN Type: OSVDB ID: 34638 webSPELL picture.php file Parameter Traversal Arbitrary File Access Source: CCN Type: BID-23348 WebSpell Picture.PHP Multiple Local File Include Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2007-1274 Source: XF Type: UNKNOWN webspell-picture-directory-traversal(33475) Source: EXPLOIT-DB Type: UNKNOWN 3673 | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |