Vulnerability Description
module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Visualshapers | Ezcontents | 2.0.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31606Vendor Advisory
- http://www.securityfocus.com/archive/1/495705/100/100/threaded
- http://www.securityfocus.com/bid/30821Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44663
- https://www.exploit-db.com/exploits/6301
- http://secunia.com/advisories/31606Vendor Advisory
- http://www.securityfocus.com/archive/1/495705/100/100/threaded
- http://www.securityfocus.com/bid/30821Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44663
- https://www.exploit-db.com/exploits/6301
FAQ
What is CVE-2008-7055?
CVE-2008-7055 is a vulnerability with a CVSS score of 5.1 (MEDIUM). module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequence...
How severe is CVE-2008-7055?
CVE-2008-7055 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-7055?
Check the references section above for vendor advisories and patch information. Affected products include: Visualshapers Ezcontents.