First published: Wed Mar 14 2007(Updated: )
Directory traversal vulnerability in mainfile.php in PHP-Nuke 8.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the lang parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP-Nuke | =7.3 | |
PHP-Nuke | =7.4 | |
PHP-Nuke | =7.1 | |
PHP-Nuke | =7.9 | |
PHP-Nuke | =8.0 | |
PHP-Nuke | =8.0.0-final | |
PHP-Nuke | =7.5 | |
PHP-Nuke | =7.2 | |
PHP-Nuke | =7.7 | |
PHP-Nuke | =7.8 | |
PHP-Nuke | =7.0 | |
PHP-Nuke | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1449 is considered to have a high severity due to its potential for unauthorized access to sensitive files.
To fix CVE-2007-1449, it is recommended to update PHP-Nuke to version 8.1 or later, which includes patches for this vulnerability.
CVE-2007-1449 affects PHP-Nuke versions 8.0 and earlier, including versions 7.0 through 8.0.
CVE-2007-1449 enables an attacker to perform directory traversal attacks, allowing them to read arbitrary files on the server.
Yes, there are known exploits for CVE-2007-1449 that demonstrate how attackers can leverage the vulnerability to access restricted files.