Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-2836

Опубликовано: 02 июл. 2007
Источник: nvd
CVSS2: 6.4
EPSS Низкий

Описание

Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:hiki:hiki:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:hiki:hiki:0.8.6:*:*:*:*:*:*:*

EPSS

Процентиль: 72%
0.00731
Низкий

6.4 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

ubuntu
около 18 лет назад

Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.

debian
около 18 лет назад

Directory traversal vulnerability in session.rb in Hiki 0.8.0 through ...

github
больше 3 лет назад

Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.

fstec
около 18 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

EPSS

Процентиль: 72%
0.00731
Низкий

6.4 Medium

CVSS2

Дефекты

CWE-22