Multiple directory traversal vulnerabilities in the Zidget/HTTP embedded HTTP server in ExtremeZ-IP File and Print Server 5.1.2x15 and earlier allow remote attackers to read arbitrary (1) gif, (2) png, (3) jpg, (4) xml, (5) ico, (6) zip, and (7) html files via a "..\" (dot dot backslash) sequence in the filename.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/ezipirla-adv.txt - | |
References | () http://aluigi.org/poc/ezipirla.zip - | |
References | () http://secunia.com/advisories/28862 - Vendor Advisory | |
References | () http://www.grouplogic.com/files/ez/hot/hotFix51.cfm - | |
References | () http://www.securityfocus.com/archive/1/487952/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27718 - | |
References | () http://www.vupen.com/english/advisories/2008/0485 - |
Information
Published : 2008-02-13 21:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0758
Mitre link : CVE-2008-0758
CVE.ORG link : CVE-2008-0758
JSON object : View
Products Affected
group_logic
- extremez-ip_print_server
- extremez-ip_file_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')