Vulnerability Description
images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ravenphpscripts | Ravennuke | 2.30 |
Related Weaknesses (CWE)
References
- http://ravenphpscripts.com/postt17156.htmlVendor Advisory
- http://www.securityfocus.com/archive/1/500988/100/0/threaded
- http://www.securityfocus.com/bid/33787
- http://www.waraxe.us/advisory-72.htmlExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48792
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48983
- https://www.exploit-db.com/exploits/8068
- http://ravenphpscripts.com/postt17156.htmlVendor Advisory
- http://www.securityfocus.com/archive/1/500988/100/0/threaded
- http://www.securityfocus.com/bid/33787
- http://www.waraxe.us/advisory-72.htmlExploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48792
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48983
- https://www.exploit-db.com/exploits/8068
FAQ
What is CVE-2009-0674?
CVE-2009-0674 is a vulnerability with a CVSS score of 6.0 (MEDIUM). images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests wit...
How severe is CVE-2009-0674?
CVE-2009-0674 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0674?
Check the references section above for vendor advisories and patch information. Affected products include: Ravenphpscripts Ravennuke.