Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html - Exploit | |
References | () http://secunia.com/advisories/31989 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4361 - | |
References | () http://www.securityfocus.com/archive/1/496847/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/31487 - | |
References | () http://www.vupen.com/english/advisories/2008/2704 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 - | |
References | () https://www.exploit-db.com/exploits/6630 - |
Information
Published : 2008-10-07 20:00
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4471
Mitre link : CVE-2008-4471
CVE.ORG link : CVE-2008-4471
JSON object : View
Products Affected
autodesk
- revit_architecture
- dwf_viewer
- design_review
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')