Vulnerability Description
Directory traversal vulnerability in inc/map.func.php in pragmaMX Landkarten 2.1 module allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the module_name parameter, as demonstrated via a static PHP code injection attack in an Apache log file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pragmamx | Landkarten | 2.1 |
References
- http://osvdb.org/34306
- http://secunia.com/advisories/24589
- http://www.securityfocus.com/bid/23044
- http://www.vupen.com/english/advisories/2007/1030
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33084
- https://www.exploit-db.com/exploits/3521
- http://osvdb.org/34306
- http://secunia.com/advisories/24589
- http://www.securityfocus.com/bid/23044
- http://www.vupen.com/english/advisories/2007/1030
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33084
- https://www.exploit-db.com/exploits/3521
FAQ
What is CVE-2007-1539?
CVE-2007-1539 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Directory traversal vulnerability in inc/map.func.php in pragmaMX Landkarten 2.1 module allows remote attackers to include arbitrary files via a .. (dot dot) sequence in the module_name parameter, as ...
How severe is CVE-2007-1539?
CVE-2007-1539 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1539?
Check the references section above for vendor advisories and patch information. Affected products include: Pragmamx Landkarten.