{ "id": "CVE-2007-5642", "sourceIdentifier": "cve@mitre.org", "published": "2007-10-23T21:47:00.000", "lastModified": "2017-09-29T01:29:39.767", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in PHP Project Management 0.8.10 and earlier allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the def_lang parameter to modules/files/list.php; the m_path parameter to (2) modules/projects/summary.inc.php or (3) modules/tasks/summary.inc.php; (4) the module parameter to modules/projects/list.php; or the module parameter to index.php in the (5) certinfo, (6) emails, (7) events, (8) fax, (9) files, (10) groupadm, (11) history, (12) info, (13) log, (14) mail, (15) messages, (16) organizations, (17) phones, (18) presence, (19) projects, (20) reports, (21) search, (22) snf, (23) syslog, (24) tasks, or (25) useradm subdirectory of modules/." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de sato de directorio en PHP Project Management 0.8.10 y anteriores permite a atacantes remotos incluir y ejecutar archivos locales de su elecci\u00f3n a trav\u00e9s de una secuencia .. (punto punto) en el par\u00e1metro 1) the def_lang en modules/files/list.php; el par\u00e1metro m_path en (2) modules/projects/summary.inc.php o (3) modules/tasks/summary.inc.php; (4) el par\u00e1metro module en modules/projects/list.php; o el par\u00e1metro module en index.php en los subdirectorios 5) certinfo, (6) emails, (7) events, (8) fax, (9) files, (10) groupadm, (11) history, (12) info, (13) log, (14) mail, (15) messages, (16) organizations, (17) phones, (18) presence, (19) projects, (20) reports, (21) search, (22) snf, (23) syslog, (24) tasks, o (25) useradm de modules/." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:phppm:php_project_management:*:*:*:*:*:*:*:*", "versionEndIncluding": "0.8.10", "matchCriteriaId": "17DDFEBB-BA6E-42D4-93CD-38AB4B2995F2" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/26148", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37348", "source": "cve@mitre.org" }, { "url": "https://www.exploit-db.com/exploits/4549", "source": "cve@mitre.org" } ] }