Directory traversal vulnerability in edittag.cgi in EditTag 1.1 allows remote attackers to read arbitrary files via a "%2F.." (encoded slash dot dot) in the file parameter.
References
Configurations
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3231 - | |
References | () http://www.securityfocus.com/archive/1/308162 - Exploit | |
References | () http://www.securityfocus.com/bid/6675 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/11159 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1351
Mitre link : CVE-2003-1351
CVE.ORG link : CVE-2003-1351
JSON object : View
Products Affected
greg_billock
- edittag
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')