HIGH · 7.5

CVE-2007-4723

Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a ...

Vulnerability Description

Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
Ragnarok Online Control Panel ProjectRagnarok Online Control Panel4.3.4a
ApacheHttp ServerAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2007-4723?

CVE-2007-4723 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a ...

How severe is CVE-2007-4723?

CVE-2007-4723 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2007-4723?

Check the references section above for vendor advisories and patch information. Affected products include: Ragnarok Online Control Panel Project Ragnarok Online Control Panel, Apache Http Server.