CVE-2013-5107
Published Dec 14, 2013
Last updated 11 years ago
Overview
- Description
- Directory traversal vulnerability in RockMongo 1.1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the ROCK_LANG cookie, as demonstrated in a login.index action to index.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rockmongo:rockmongo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F07E63CA-DC1E-4C04-8894-38285D9FA3C6", "versionEndIncluding": "1.1.5" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60343CDA-3F7C-45F7-87BE-598596D687F7" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "098AE33E-6063-408F-B5E1-13A50596B941" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B50E327E-8247-4148-83EB-D7ABA22F8988" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D574D727-4C70-49A9-BBF3-A401B8FD11D8" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B517EAA8-5AA6-4CBE-AEA8-8E166A3B8399" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BBC287E-D5EF-4262-A51C-5AD3D7449EB6" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B7C3ABC-7BAD-464C-AD4F-B561882ABC4B" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D54D8D4D-E3BC-4361-A562-C5E10686F1FE" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97CAD3ED-BC22-4BF4-A8E2-E28E9A9D0C51" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70AA3C05-4D64-4024-BD13-078750EA7465" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9384F995-44B7-4DF5-BA94-CA868AE8E82F" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A655F81A-ED7E-4B8A-8818-D5E20182CAB7" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC82766A-FC33-4147-8F2D-B4882F79F02D" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2506C1E-853E-4C65-9066-94208D1C0E3A" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "115A04F6-57DC-4C94-9935-518700AA5143" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2E74AE8-CEEB-46E3-935D-CDEED7844249" }, { "criteria": "cpe:2.3:a:rockmongo:rockmongo:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB3867A1-256A-4EFE-9864-A41B4CEF3F03" } ], "operator": "OR" } ] } ]