ID CVE-2007-1524
Summary Directory traversal vulnerability in themes/default/ in ZomPlog 3.7.6 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) in the settings[skin] parameter, as demonstrated by injecting PHP code into an Apache HTTP Server log file, which can then be included via themes/default/.
References
Vulnerable Configurations
  • cpe:2.3:a:zomplog:zomplog:3.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:zomplog:zomplog:3.7.6:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 10-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 22157
exploit-db 3476
secunia 24520
vupen ADV-2007-0966
xf zomplog-index-file-include(32982)
Last major update 10-10-2017 - 01:30
Published 20-03-2007 - 20:19
Last modified 10-10-2017 - 01:30
Back to Top