ID CVE-2007-1850
Summary Directory traversal vulnerability in classes/captcha/captcha.jpg.php in Drake CMS allows remote attackers to read arbitrary files or list arbitrary directories, and obtain the installation path, via a .. (dot dot) in the d_private parameter. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
References
Vulnerable Configurations
  • cpe:2.3:a:drake_team:drake_cms:*:*:*:*:*:*:*:*
    cpe:2.3:a:drake_team:drake_cms:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 16-10-2018 - 16:40)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bugtraq 20070330 DrakeCMS multiple vulerabilities
sreason 2522
xf drakecms-dprivate-directory-traversal(33333)
statements via4
contributor legols558
lastmodified 2007-04-17
organization Drake CMS
statement An apposite mailing list (drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature). This vulnerability has been fixed in the upcoming Drake CMS v0.3.9 Beta, previous versions’ users can update their software directly from the administrative backend.
Last major update 16-10-2018 - 16:40
Published 03-04-2007 - 16:19
Last modified 16-10-2018 - 16:40
Back to Top