Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430691 - | |
References | () http://hikiwiki.org/en/advisory20070624.html - | |
References | () http://hikiwiki.org/hiki-0_8_6.patch - | |
References | () http://jvn.jp/jp/JVN%2305187780/index.html - | |
References | () http://osvdb.org/37469 - | |
References | () http://secunia.com/advisories/25764 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/25874 - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2007/dsa-1324 - | |
References | () http://www.securityfocus.com/bid/24603 - | |
References | () http://www.vupen.com/english/advisories/2007/2304 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35029 - |
Information
Published : 2007-07-02 19:30
Updated : 2024-11-21 00:31
NVD link : CVE-2007-2836
Mitre link : CVE-2007-2836
CVE.ORG link : CVE-2007-2836
JSON object : View
Products Affected
hiki
- hiki
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')