CVE-2007-1850
Published Apr 3, 2007
Last updated 6 years ago
Overview
- Description
- Directory traversal vulnerability in classes/captcha/captcha.jpg.php in Drake CMS allows remote attackers to read arbitrary files or list arbitrary directories, and obtain the installation path, via a .. (dot dot) in the d_private parameter. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- Drake CMSAn apposite mailing list (drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature). This vulnerability has been fixed in the upcoming Drake CMS v0.3.9 Beta, previous versions’ users can update their software directly from the administrative backend.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drake_team:drake_cms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B85A9DC-C9D4-4FE1-AB55-8EC53DB5E792" } ], "operator": "OR" } ] } ]