Vulnerability CVE-2011-4713


Published: 2011-12-08   Modified: 2012-02-13

Description:
Directory traversal vulnerability in catalog/content.php in osCSS2 2.1.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the _ID parameter to (1) catalog/shopping_cart.php or (2) catalog/content.php.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Oscss -> Oscss 

 References:
http://www.securityfocus.com/archive/1/520421
http://www.rul3z.de/advisories/SSCHADV2011-034.txt
http://www.exploit-db.com/exploits/18099
http://secunia.com/advisories/46741
http://seclists.org/fulldisclosure/2011/Nov/117
http://oscss.svn.sourceforge.net/viewvc/oscss?view=revision&revision=3872
http://forums.oscss.org/2-security/oscss2-id-parameter-local-file-inclusion-t1999.html#p11194

Copyright 2024, cxsecurity.com

 

Back to Top