Zomplog 3.8.1 and earlier stores potentially sensitive information under the web root with insufficient access control, which allows remote attackers to download files that were uploaded by users, as demonstrated by obtaining a directory listing via a direct request to /upload and then retrieving individual files. NOTE: in a non-default configuration, the directory listing is denied, but filenames may be predicable.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/25861 | Exploit Patch |
https://www.exploit-db.com/exploits/4466 |
Configurations
Information
Published : 2007-10-08 16:17
Updated : 2017-09-28 18:29
NVD link : CVE-2007-5278
Mitre link : CVE-2007-5278
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
zomplog
- zomplog