Vulnerability CVE-2009-0674


Published: 2009-02-22   Modified: 2012-02-13

Description:
images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.

See advisories in our WLB2 database:
Topic
Author
Date
High
Multiple Vulnerabilities in RavenNuke 2.3.0
waraxe
17.02.2009
High
Multiple Vulnerabilities in RavenNuke 2.3.0
waraxe
19.02.2009

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Ravenphpscripts -> Ravennuke 

 References:
http://ravenphpscripts.com/postt17156.html
http://www.securityfocus.com/archive/1/500988/100/0/threaded
http://www.securityfocus.com/bid/33787
http://www.waraxe.us/advisory-72.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/48792
https://exchange.xforce.ibmcloud.com/vulnerabilities/48983
https://www.exploit-db.com/exploits/8068

Copyright 2024, cxsecurity.com

 

Back to Top