{ "id": "CVE-2007-0173", "sourceIdentifier": "cve@mitre.org", "published": "2007-01-11T00:28:00.000", "lastModified": "2017-10-19T01:29:57.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in index.php in L2J Statistik Script 0.09 and earlier, when register_globals is enabled and magic_quotes is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by index.php." }, { "lang": "es", "value": "Vulnerabilidad de escalado de directorio en el index.php del L2J Statistik Script 0.09 y versiones anteriores, cuando el registro global (register_globals) est\u00e1 habilitado y las comillas m\u00e1gicas (magic_quotes) est\u00e1n deshabilitadas, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n mediante .. (punto punto) en el par\u00e1metro page, como lo demostrado mediante la inyecci\u00f3n de secuencias PHP en el fichero de log del Apache HTTP Server, que luego es incluido por el index.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:l2j:statistik_script:0.09:*:*:*:*:*:*:*", "matchCriteriaId": "4417A22E-BBB5-4655-8682-87C53CBFB4E6" } ] } ] } ], "references": [ { "url": "http://osvdb.org/35914", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/21914", "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2007/0097", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31309", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/3091", "source": "cve@mitre.org" } ] }