CVE-2007-6660 - Information Leak / Disclosure vulnerability in 2Z Project 2Z Project 0.9.6.1

Publication

2008-01-04

Last modification

2018-10-15

Summary

2z project 0.9.6.1 allows remote attackers to obtain sensitive information via (1) a request to index.php with an invalid template or (2) a request to the default URI with certain year and month parameters, which reveals the path in various error messages.

Description

2z Project is prone to multiple input-validation vulnerabilities because it fails to adequately sanitize user-supplied input. These vulnerabilities include HTML-injection issues, a cross-site scripting issue, and an arbitrary-file-upload issue.Attackers can exploit these issues to execute arbitrary HTML and script code in the context of the affected site. Successful exploits could allow an attacker to compromise the application, steal cookie-based authentication credentials, or control how the site is rendered to the user; other attacks are also possible.2z Project 0.9.6.1 is vulnerable; other versions may also be affected.

Solution

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: info@vumetric.com.

Exploit

An attacker can use a browser to exploit these issues.To exploit a cross-site scripting issue, the attacker must entice an unsuspecting user to follow a malicious URI. The following proof-of-concept URIs are available: /data/vulnerabilities/exploits/27057.html

Classification

CWE-200 - Information Leak / Disclosure

Risk level (CVSS AV:N/AC:L/Au:N/C:N/I:P/A:N)

Medium

5.0

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
2Z Project 2Z Project  0.9.6.1