Vulnerabilities > CVE-2007-0872 - Unspecified vulnerability in Plain OLD Webserver Plain OLD Webserver 0.0.7/0.0.8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in the Plain Old Webserver (POW) add-on before 0.0.9 for Mozilla Firefox allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Plain Old Webserver 0.0.7/0.0.8 Firefox Extension Directory Traversal Vulnerability. CVE-2007-0872. Remote exploit for windows platform |
id | EDB-ID:29575 |
last seen | 2016-02-03 |
modified | 2006-09-25 |
published | 2006-09-25 |
reporter | Stefano Di Paola |
source | https://www.exploit-db.com/download/29575/ |
title | Plain Old Webserver 0.0.7/0.0.8 Firefox Extension Directory Traversal Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | POW_DIR_TRAVERSAL.NASL |
description | The remote host is running Plain Old Webserver, a Firefox extension that acts as a web server. The version of Plain Old Webserver (pow) installed on the remote host fails to sanitize the URL of directory traversal sequences. An unauthenticated attacker can exploit this to read files on the affected host subject to the permissions of the user id under which Firefox runs. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24669 |
published | 2007-02-19 |
reporter | This script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/24669 |
title | Plain Old Webserver URI Traversal Arbitrary File Access |
code |
|
References
- http://osvdb.org/33174
- http://osvdb.org/33174
- http://seclists.org/fulldisclosure/2007/Feb/0196.html
- http://seclists.org/fulldisclosure/2007/Feb/0196.html
- http://seclists.org/fulldisclosure/2007/Feb/0210.html
- http://seclists.org/fulldisclosure/2007/Feb/0210.html
- http://secunia.com/advisories/24127
- http://secunia.com/advisories/24127
- http://www.securityfocus.com/bid/22502
- http://www.securityfocus.com/bid/22502
- http://www.vupen.com/english/advisories/2007/0558
- http://www.vupen.com/english/advisories/2007/0558
- https://addons.mozilla.org/firefox/3002/
- https://addons.mozilla.org/firefox/3002/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32467
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32467