files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/36783 | Exploit | 
| http://secunia.com/advisories/37117 | Vendor Advisory | 
| http://www.waraxe.us/advisory-75.html | Exploit | 
| http://www.securityfocus.com/archive/1/507358/100/0/threaded | 
Configurations
                    Information
                Published : 2009-10-26 10:30
Updated : 2018-10-10 12:47
NVD link : CVE-2009-3787
Mitre link : CVE-2009-3787
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                vivvo
- vivvo


