CVE-2007-1849
Published Apr 3, 2007
Last updated 7 years ago
Overview
- Description
- Directory traversal vulnerability in 404.php in Drake CMS allows remote attackers to include and execute arbitrary local arbitrary files via a .. (dot dot) in the d_private parameter. NOTE: some of these details are obtained from third party information. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Drake CMSAn apposite mailing list (drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature). This vulnerability has been fixed in Drake CMS v0.3.8 Beta, previous versions’ users can update their software directly from the administrative backend.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A605E0F-C5F3-4E2C-8DAE-63B52C60C67B" }, { "criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61285E3A-BB8E-4506-99EE-D95312DB8B96" } ], "operator": "OR" } ] } ]