Vulnerability Description
Anaconda Partners Clipper 3.3 and earlier allows a remote attacker to read arbitrary files via a '..' (dot dot) attack in the template parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Anaconda Partners | Clipper | <= 3.3 |
References
- http://anacondapartners.com/cgi-local/apexec.pl?template=ap_releasenotestemplate
- http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2512ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6286
- http://anacondapartners.com/cgi-local/apexec.pl?template=ap_releasenotestemplate
- http://archives.neohapsis.com/archives/bugtraq/2001-03/0395.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2512ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6286
FAQ
What is CVE-2001-0593?
CVE-2001-0593 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Anaconda Partners Clipper 3.3 and earlier allows a remote attacker to read arbitrary files via a '..' (dot dot) attack in the template parameter.
How severe is CVE-2001-0593?
CVE-2001-0593 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0593?
Check the references section above for vendor advisories and patch information. Affected products include: Anaconda Partners Clipper.