ID CVE-2007-2285
Summary Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.
References
Vulnerable Configurations
  • cpe:2.3:a:jack_slocum:ext_js:1.0_alpha1:*:*:*:*:*:*:*
    cpe:2.3:a:jack_slocum:ext_js:1.0_alpha1:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 11-10-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
bid 23643
exploit-db 3800
osvdb 35561
vim
  • 20070426 False: ext 1.0 alpha1 (feed-proxy.php) Remote File Disclosure
  • 20070426 Re: False: ext 1.0 alpha1 (feed-proxy.php) Remote File Disclosure
  • 20070426 re: False: ext 1.0 alpha1 (feed-proxy.php) Remote File Disclosure
xf ext-feedproxy-directory-traversal(33864)
Last major update 11-10-2017 - 01:32
Published 26-04-2007 - 19:19
Last modified 11-10-2017 - 01:32
Back to Top