Zomplog 3.8.1 and earlier stores potentially sensitive information under the web root with insufficient access control, which allows remote attackers to download files that were uploaded by users, as demonstrated by obtaining a directory listing via a direct request to /upload and then retrieving individual files. NOTE: in a non-default configuration, the directory listing is denied, but filenames may be predicable.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/25861 | Exploit Patch |
https://www.exploit-db.com/exploits/4466 | |
http://www.securityfocus.com/bid/25861 | Exploit Patch |
https://www.exploit-db.com/exploits/4466 |
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/25861 - Exploit, Patch | |
References | () https://www.exploit-db.com/exploits/4466 - |
Information
Published : 2007-10-08 23:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5278
Mitre link : CVE-2007-5278
CVE.ORG link : CVE-2007-5278
JSON object : View
Products Affected
zomplog
- zomplog
CWE
CWE-264
Permissions, Privileges, and Access Controls