Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.
References
Link | Resource |
---|---|
http://osvdb.org/45879 | Broken Link |
http://securityreason.com/securityalert/3100 | Third Party Advisory |
http://www.securityfocus.com/archive/1/478263/100/0/threaded | Third Party Advisory VDB Entry |
http://osvdb.org/45879 | Broken Link |
http://securityreason.com/securityalert/3100 | Third Party Advisory |
http://www.securityfocus.com/archive/1/478263/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/45879 - Broken Link | |
References | () http://securityreason.com/securityalert/3100 - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/478263/100/0/threaded - Third Party Advisory, VDB Entry |
Information
Published : 2007-09-05 19:17
Updated : 2024-11-21 00:36
NVD link : CVE-2007-4723
Mitre link : CVE-2007-4723
CVE.ORG link : CVE-2007-4723
JSON object : View
Products Affected
apache
- http_server
ragnarok_online_control_panel_project
- ragnarok_online_control_panel
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')