CVE-2007-6653 - Path Traversal vulnerability in Mihalism Multi Host 2.07

Publication

2008-01-04

Last modification

2017-09-29

Summary

Directory traversal vulnerability in download.php in Mihalism Multi Host 2.0.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.

Description

Mihalism Multi Host is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.Exploiting this issue may allow an attacker to access sensitive information that could aid in further attacks.Mihalism Multi Host 2.0.7 is vulnerable; other versions may be affected as well.

Solution

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: info@vumetric.com.

Exploit

An attacker can exploit this issue via a browser.The following example URI is available:http://www.example.com//Script/download.php?file=../../../../../../../../../../../etc/passwd

Classification

CWE-22 - Path Traversal

Risk level (CVSS AV:N/AC:L/Au:N/C:N/I:P/A:N)

Medium

5.0

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Mihalism Multi Host  2.07