cvelist/2007/5xxx/CVE-2007-5463.json
2019-03-18 03:47:29 +00:00

92 lines
3.1 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5463",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an \"iDEAL transaction\", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "3233",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/3233"
},
{
"name": "20071010 Regarding vulnerability in ViArt Shop",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/481978/100/0/threaded"
},
{
"name": "http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.html",
"refsource": "CONFIRM",
"url": "http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.html"
},
{
"name": "40151",
"refsource": "OSVDB",
"url": "http://osvdb.org/40151"
},
{
"name": "27199",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27199"
},
{
"name": "25998",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/25998"
},
{
"name": "viart-idealprocess-path-disclosure(37048)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37048"
}
]
}
}