ID CVE-2005-0630
Summary sendpm.php in PBLang 4.63 allows remote authenticated users to read arbitrary files via a full pathname in the orig parameter.
References
Vulnerable Configurations
  • cpe:2.3:a:pblang:pblang:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:pblang:pblang:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:pblang:pblang:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:pblang:pblang:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:pblang:pblang:4.56_4.5_rc2:*:*:*:*:*:*:*
    cpe:2.3:a:pblang:pblang:4.56_4.5_rc2:*:*:*:*:*:*:*
  • cpe:2.3:a:pblang:pblang:4.63:*:*:*:*:*:*:*
    cpe:2.3:a:pblang:pblang:4.63:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 12690
bugtraq 20050301 Software PBLang 4.63 sendpm.php reply file read vulnerability
confirm http://pblforum.drmartinus.de/post.php?cat=2&fid=2&pid=40&page=1
xf pblang-sendpm-obtain-information(19544)
Last major update 11-07-2017 - 01:32
Published 01-03-2005 - 05:00
Last modified 11-07-2017 - 01:32
Back to Top