CVE-2007-5278

Zomplog 3.8.1 and earlier stores potentially sensitive information under the web root with insufficient access control, which allows remote attackers to download files that were uploaded by users, as demonstrated by obtaining a directory listing via a direct request to /upload and then retrieving individual files. NOTE: in a non-default configuration, the directory listing is denied, but filenames may be predicable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zomplog:zomplog:3.8.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/25861 - Exploit, Patch () http://www.securityfocus.com/bid/25861 - Exploit, Patch
References () https://www.exploit-db.com/exploits/4466 - () https://www.exploit-db.com/exploits/4466 -

Information

Published : 2007-10-08 23:17

Updated : 2024-11-21 00:37


NVD link : CVE-2007-5278

Mitre link : CVE-2007-5278

CVE.ORG link : CVE-2007-5278


JSON object : View

Products Affected

zomplog

  • zomplog
CWE
CWE-264

Permissions, Privileges, and Access Controls