First published: Sun Jun 19 2005(Updated: )
Directory traversal vulnerability in Edgewall Trac 0.8.3 and earlier allows remote attackers to read or write arbitrary files via a .. (dot dot) in the id parameter to the (1) upload or (2) attachment scripts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Edgewall Trac | =0.5 | |
Edgewall Trac | =0.5.1 | |
Edgewall Trac | =0.5.2 | |
Edgewall Trac | =0.6 | |
Edgewall Trac | =0.6.1 | |
Edgewall Trac | =0.7 | |
Edgewall Trac | =0.7.1 | |
Edgewall Trac | =0.8 | |
Edgewall Trac | =0.8.1 | |
Edgewall Trac | =0.8.2 | |
Edgewall Trac | =0.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2007 is considered a high severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2005-2007, upgrade Edgewall Trac to version 0.8.4 or later.
CVE-2005-2007 affects Edgewall Trac versions from 0.5.0 up to 0.8.3.
CVE-2005-2007 exploits directory traversal by using the '..' (dot dot) notation in file path parameters.
Yes, CVE-2005-2007 can lead to significant data breaches if attackers gain access to arbitrary files.