Vulnerability CVE-2007-2285


Published: 2007-04-26   Modified: 2012-02-12

Description:
Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Jack slocum -> Ext js 

 References:
http://www.securityfocus.com/bid/23643
http://www.milw0rm.com/exploits/3800
http://osvdb.org/35561
http://attrition.org/pipermail/vim/2007-April/001549.html
http://attrition.org/pipermail/vim/2007-April/001546.html
http://attrition.org/pipermail/vim/2007-April/001545.html
http://xforce.iss.net/xforce/xfdb/33864

Copyright 2024, cxsecurity.com

 

Back to Top