CVE-2007-4723

Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:ragnarok_online_control_panel_project:ragnarok_online_control_panel:4.3.4a:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:36

Type Values Removed Values Added
References () http://osvdb.org/45879 - Broken Link () http://osvdb.org/45879 - Broken Link
References () http://securityreason.com/securityalert/3100 - Third Party Advisory () http://securityreason.com/securityalert/3100 - Third Party Advisory
References () http://www.securityfocus.com/archive/1/478263/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/478263/100/0/threaded - Third Party Advisory, VDB Entry

Information

Published : 2007-09-05 19:17

Updated : 2024-11-21 00:36


NVD link : CVE-2007-4723

Mitre link : CVE-2007-4723

CVE.ORG link : CVE-2007-4723


JSON object : View

Products Affected

apache

  • http_server

ragnarok_online_control_panel_project

  • ragnarok_online_control_panel
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')