Vulnerability CVE-2007-5463


Published: 2007-10-15   Modified: 2012-02-12

Description:
ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Regarding vulnerability in ViArt Shop
Vendor
16.10.2007

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Viart -> SHOP 

 References:
http://securityreason.com/securityalert/3233
http://www.securityfocus.com/archive/1/481978/100/0/threaded
http://www.securityfocus.com/bid/25998
http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/37048

Copyright 2024, cxsecurity.com

 

Back to Top