Vulnerability CVE-2012-1790


Published: 2012-03-19   Modified: 2012-03-20

Description:
Absolute path traversal vulnerability in Webgrind 1.0 and 1.0.2 allows remote attackers to read arbitrary files via a full pathname in the file parameter to index.php.

See advisories in our WLB2 database:
Topic
Author
Date
Low
webgrind 1.0 (dataFile) Remote Reflected XSS Vulnerability
Gjoko 'Liqu...
18.02.2012
High
webgrind 1.0 (file param) Local File Inclusion Vulnerability
Michael Meyer
26.02.2012

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Webgrind project -> Webgrind 
Joakim nygard -> Webgrind 

 References:
http://code.google.com/p/webgrind/issues/detail?id=66
http://packetstormsecurity.org/files/110216
http://www.exploit-db.com/exploits/18523
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5075.php
https://exchange.xforce.ibmcloud.com/vulnerabilities/73509

Copyright 2024, cxsecurity.com

 

Back to Top