Vulnerability Description
Directory traversal vulnerability in extras/update.php in osCommerce 2.2 allows remote attackers to read arbitrary files via (1) .. sequences or (2) a full pathname in the readme_file parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oscommerce | Oscommerce | 2.2_ms2 |
References
- http://retrogod.altervista.org/oscommerce_22_adv.html
- http://securitytracker.com/id?1015944
- http://sourceforge.net/mailarchive/message.php?msg_id=12318248
- http://www.oscommerce.com/community/bugs%2C2835
- http://www.osvdb.org/18249
- http://www.securityfocus.com/archive/1/431012
- http://www.securityfocus.com/archive/1/431068
- http://www.securityfocus.com/bid/14294Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25861
- http://retrogod.altervista.org/oscommerce_22_adv.html
- http://securitytracker.com/id?1015944
- http://sourceforge.net/mailarchive/message.php?msg_id=12318248
- http://www.oscommerce.com/community/bugs%2C2835
- http://www.osvdb.org/18249
- http://www.securityfocus.com/archive/1/431012
FAQ
What is CVE-2005-2330?
CVE-2005-2330 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in extras/update.php in osCommerce 2.2 allows remote attackers to read arbitrary files via (1) .. sequences or (2) a full pathname in the readme_file parameter.
How severe is CVE-2005-2330?
CVE-2005-2330 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2330?
Check the references section above for vendor advisories and patch information. Affected products include: Oscommerce Oscommerce.