Directory traversal vulnerability in the modURL function in instance.c in Weborf before 0.12.3 allows remote attackers to read arbitrary files via ..%2f sequences in a URI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://code.google.com/p/weborf/source/detail?r=464 - | |
References | () http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3 - Patch | |
References | () http://secunia.com/advisories/41286 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/14925/ - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2010/09/17/3 - | |
References | () http://www.openwall.com/lists/oss-security/2010/09/17/8 - | |
References | () http://www.osvdb.org/67840 - |
Information
Published : 2010-09-24 19:00
Updated : 2024-11-21 01:18
NVD link : CVE-2010-3306
Mitre link : CVE-2010-3306
CVE.ORG link : CVE-2010-3306
JSON object : View
Products Affected
salvo_g._tomaselli
- weborf
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')