Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2j9m-xmx2-hj4v

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.

ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.

EPSS

Процентиль: 37%
0.00154
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
больше 18 лет назад

ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.

EPSS

Процентиль: 37%
0.00154
Низкий

Дефекты

CWE-22