CVE-2010-1298

Published Apr 6, 2010

Last updated 15 years ago

Overview

Description
Directory traversal vulnerability in view.php in Pulse CMS 1.2.2 allows remote attackers to read arbitrary files via directory traversal sequences in the f parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Source
cve@mitre.org
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
4
Impact score
2.9
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-22

Evaluator

Comment
per: http://secunia.com/advisories/38650 '2) Input passed via the "f" parameter to view.php is not properly sanitised before being used to read files. This can be exploited to disclose the content of local files via directory traversal sequences. Successful exploitation of this vulnerability requires authentication.'
Impact
-
Solution
-

Configurations