ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.
References
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/40151 - | |
References | () http://secunia.com/advisories/27199 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/3233 - | |
References | () http://www.securityfocus.com/archive/1/481978/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/25998 - | |
References | () http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.html - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37048 - |
Information
Published : 2007-10-15 22:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5463
Mitre link : CVE-2007-5463
CVE.ORG link : CVE-2007-5463
JSON object : View
Products Affected
viart
- shop
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')