ID |
CVE-2007-1850
|
Summary |
Directory traversal vulnerability in classes/captcha/captcha.jpg.php in Drake CMS allows remote attackers to read arbitrary files or list arbitrary directories, and obtain the installation path, via a .. (dot dot) in the d_private parameter. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS." |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.0 (as of 16-10-2018 - 16:40) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
refmap
via4
|
bugtraq | 20070330 DrakeCMS multiple vulerabilities | sreason | 2522 | xf | drakecms-dprivate-directory-traversal(33333) |
|
statements
via4
|
contributor | legols558 | lastmodified | 2007-04-17 | organization | Drake CMS | statement | An apposite mailing list
(drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature).
This vulnerability has been fixed in the upcoming Drake CMS v0.3.9 Beta, previous versions’ users can update their software directly from the administrative backend.
|
|
Last major update |
16-10-2018 - 16:40 |
Published |
03-04-2007 - 16:19 |
Last modified |
16-10-2018 - 16:40 |