Vulnerability Description
Directory traversal vulnerability in the file_get_contents function in SOPlanning 1.32 and earlier allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) in a URL path parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Soplanning | Soplanning | <= 1.32 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/Jul/44Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/75726Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/37604/Third Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/132654/Simple-Online-Planning-Tool-1.3.2-XSThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2015/Jul/44Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/75726Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/37604/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-8676?
CVE-2014-8676 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Directory traversal vulnerability in the file_get_contents function in SOPlanning 1.32 and earlier allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) in a URL pat...
How severe is CVE-2014-8676?
CVE-2014-8676 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8676?
Check the references section above for vendor advisories and patch information. Affected products include: Soplanning Soplanning.