First published: Mon Apr 30 2007(Updated: )
Directory traversal vulnerability in picture.php in WebSPELL 4.01.02 and earlier, when PHP before 4.3.0 is used, allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=4.2.3 | |
Webspell | <=4.01.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2369 is considered a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2007-2369, upgrade to a version of PHP higher than 4.3.0 and update WebSPELL to version 4.01.03 or later.
CVE-2007-2369 can lead to directory traversal attacks, allowing attackers to read sensitive files on the server.
CVE-2007-2369 affects WebSPELL versions up to 4.01.02 and PHP versions up to 4.2.3.
While CVE-2007-2369 is an older vulnerability, it may still be of concern in legacy systems running outdated versions of the affected software.