Vulnerability Description
Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jack Slocum | Ext Js | 1.0_alpha1 |
References
- http://attrition.org/pipermail/vim/2007-April/001545.html
- http://attrition.org/pipermail/vim/2007-April/001546.html
- http://attrition.org/pipermail/vim/2007-April/001549.html
- http://osvdb.org/35561
- http://www.securityfocus.com/bid/23643
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33864
- https://www.exploit-db.com/exploits/3800
- http://attrition.org/pipermail/vim/2007-April/001545.html
- http://attrition.org/pipermail/vim/2007-April/001546.html
- http://attrition.org/pipermail/vim/2007-April/001549.html
- http://osvdb.org/35561
- http://www.securityfocus.com/bid/23643
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33864
- https://www.exploit-db.com/exploits/3800
FAQ
What is CVE-2007-2285?
CVE-2007-2285 is a vulnerability with a CVSS score of 7.8 (HIGH). Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NO...
How severe is CVE-2007-2285?
CVE-2007-2285 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2285?
Check the references section above for vendor advisories and patch information. Affected products include: Jack Slocum Ext Js.