files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2009-3759 | files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:38:30.301Z
Reserved: 2009-10-26T00:00:00
Link: CVE-2009-3787
No data.
Status : Deferred
Published: 2009-10-26T17:30:00.577
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-3787
No data.
OpenCVE Enrichment
No data.
EUVD