Vulnerability Description
Directory traversal vulnerability in enc/stylecss.php in shopkitplus allows remote attackers to read arbitrary files via a .. (dot dot) in the changetheme parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Watersweb Shops | Shop Kit Plus | initial |
References
- http://osvdb.org/33755
- http://secunia.com/advisories/24279
- http://securityreason.com/securityalert/2295
- http://www.securityfocus.com/archive/1/461071/100/0/threaded
- http://www.securityfocus.com/bid/22697ExploitPatchVendor Advisory
- http://www.vupen.com/english/advisories/2007/0747
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32660
- http://osvdb.org/33755
- http://secunia.com/advisories/24279
- http://securityreason.com/securityalert/2295
- http://www.securityfocus.com/archive/1/461071/100/0/threaded
- http://www.securityfocus.com/bid/22697ExploitPatchVendor Advisory
- http://www.vupen.com/english/advisories/2007/0747
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32660
FAQ
What is CVE-2007-1127?
CVE-2007-1127 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Directory traversal vulnerability in enc/stylecss.php in shopkitplus allows remote attackers to read arbitrary files via a .. (dot dot) in the changetheme parameter.
How severe is CVE-2007-1127?
CVE-2007-1127 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1127?
Check the references section above for vendor advisories and patch information. Affected products include: Watersweb Shops Shop Kit Plus.