Vulnerability Description
JSPWiki 2.4.103 and 2.5.139-beta allows remote attackers to obtain sensitive information (full path) via an invalid integer in the version parameter to the default URI under attach/Main/.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jspwiki | Jspwiki | 2.4.103 |
Related Weaknesses (CWE)
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html
- http://secunia.com/advisories/26961PatchVendor Advisory
- http://securityreason.com/securityalert/3167
- http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog
- http://www.securityfocus.com/archive/1/480570/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36768
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/066096.html
- http://secunia.com/advisories/26961PatchVendor Advisory
- http://securityreason.com/securityalert/3167
- http://www.ecyrd.com/~jalkanen/JSPWiki/2.4.104/ChangeLog
- http://www.securityfocus.com/archive/1/480570/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36768
FAQ
What is CVE-2007-5119?
CVE-2007-5119 is a vulnerability with a CVSS score of 4.3 (MEDIUM). JSPWiki 2.4.103 and 2.5.139-beta allows remote attackers to obtain sensitive information (full path) via an invalid integer in the version parameter to the default URI under attach/Main/.
How severe is CVE-2007-5119?
CVE-2007-5119 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5119?
Check the references section above for vendor advisories and patch information. Affected products include: Jspwiki Jspwiki.