Show plain JSON{"id": "CVE-2007-1850", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-04-03T16:19:00.000", "references": [{"url": "http://securityreason.com/securityalert/2522", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/464272/100/0/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33333", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/2522", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/464272/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33333", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Directory traversal vulnerability in classes/captcha/captcha.jpg.php in Drake CMS allows remote attackers to read arbitrary files or list arbitrary directories, and obtain the installation path, via a .. (dot dot) in the d_private parameter. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated \"We do not consider security reports valid until the first official release of Drake CMS.\""}, {"lang": "es", "value": "Vulnerabilidad de escalado de directorio en el classes/captcha/captcha.jpg.php del Drake CMS permite a atacantes remotos leer ficheros de su elecci\u00f3n o listar directorios arbitrarios, y obtener la ruta de instalaci\u00f3n a trav\u00e9s de un .. (punto punto) en el par\u00e1metro d_private.NOTA: Drake CMS s\u00f3lo tiene disponible una versi\u00f3n beta y el proveedor ha indicado previamente \"No se van a considerar reportes de seguridad v\u00e1lidos hasta la primera versi\u00f3n oficial del Drake CMS\"."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:drake_team:drake_cms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B85A9DC-C9D4-4FE1-AB55-8EC53DB5E792"}], "operator": "OR"}]}], "vendorComments": [{"comment": "An apposite mailing list\n(drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature).\n\nThis vulnerability has been fixed in the upcoming Drake CMS v0.3.9 Beta, previous versions\u2019 users can update their software directly from the administrative backend.\n", "lastModified": "2007-04-17T00:00:00", "organization": "Drake CMS"}], "sourceIdentifier": "cve@mitre.org"}