CVE-2014-3777
Published Jul 16, 2014
Last updated 10 years ago
Overview
- Description
- Directory traversal vulnerability in Reportico PHP Report Designer before 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the xmlin parameter.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:reportico:php_report_designer:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D608202-2EA1-4324-B646-D49A8EECFA5D", "versionEndIncluding": "3.3" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "809CDA5E-8B2D-4016-963E-EB65C1EFF521" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F744CF6-E5AD-4991-AE43-BE544EA81C79" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6F5B61-25CE-4C48-B76D-4070FAE786D3" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C82F6F3B-8EE3-4F37-A388-29B2BC379B29" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6594755-63B6-4FBB-8505-9C3CB583F0B9" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4648CB21-E557-41B9-BA4A-CB518BA97AD9" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65626120-6D1E-4C6A-B131-638D46E80E4C" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "163F0101-078D-471B-8A25-5FC1872AF059" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15469291-8713-4308-9189-5371010EC406" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A760F5E-6F78-4B39-BAF7-BDB80BEDD5D8" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "951ED785-B52C-4F05-AD91-0FDD999DACCE" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43B90C4C-9590-44CA-BBFB-281D8D4ABDC3" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9839AFD0-751E-47A6-B53F-498232254782" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27730675-213C-4BF0-AB62-54BB5AEB323D" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3426856B-880F-49A7-8057-1FD3ADE1B077" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AFB7418-50C4-4623-A53E-D41F79F2A51A" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90F3E1E9-9DE0-410C-B6A8-71B658C58480" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F81F8111-AF6D-44B5-A4D9-DB37851AA84E" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE683882-C518-4B0F-9BB3-87ED0DF4A4C3" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20590D12-6E2D-4488-8276-2E13AD84622F" }, { "criteria": "cpe:2.3:a:reportico:php_report_designer:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3FF8176-A8A2-4713-9ABE-5605390CDA3C" } ], "operator": "OR" } ] } ]