Vulnerability Description
Directory traversal vulnerability in language.php in VerliAdmin 0.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang cookie, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Verliadmin | Verliadmin | <= 0.3 |
References
- http://osvdb.org/32352
- http://www.vupen.com/english/advisories/2007/0035
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31241
- https://www.exploit-db.com/exploits/3075
- http://osvdb.org/32352
- http://www.vupen.com/english/advisories/2007/0035
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31241
- https://www.exploit-db.com/exploits/3075
FAQ
What is CVE-2007-0098?
CVE-2007-0098 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Directory traversal vulnerability in language.php in VerliAdmin 0.3 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot d...
How severe is CVE-2007-0098?
CVE-2007-0098 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0098?
Check the references section above for vendor advisories and patch information. Affected products include: Verliadmin Verliadmin.