First published: Fri Mar 16 2007(Updated: )
** DISPUTED ** Directory traversal vulnerability in index.php in PHP Point Of Sale for osCommerce 1.1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the cfg_language parameter. NOTE: this issue has been disputed by CVE, since the cfg_language variable is configured upon proper product installation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Php Point Of Sale | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1477 is classified as a moderate severity vulnerability.
To fix CVE-2007-1477, update the PHP Point Of Sale application to a version that is not affected or validate user inputs properly.
CVE-2007-1477 allows remote attackers to execute arbitrary local files through a directory traversal exploit.
CVE-2007-1477 affects PHP Point Of Sale for osCommerce version 1.1.
CVE-2007-1477 may still pose a risk if outdated versions of PHP Point Of Sale are in use.