Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
References
Link | Resource |
---|---|
http://osvdb.org/45879 | Broken Link |
http://securityreason.com/securityalert/3100 | Third Party Advisory |
http://www.securityfocus.com/archive/1/478263/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2007-09-05 19:17
Updated : 2024-02-28 11:01
NVD link : CVE-2007-4723
Mitre link : CVE-2007-4723
CVE.ORG link : CVE-2007-4723
JSON object : View
Products Affected
ragnarok_online_control_panel_project
- ragnarok_online_control_panel
apache
- http_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')