First published: Fri Jan 04 2008(Updated: )
Directory traversal vulnerability in file.php in CuteNews 2.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading the admin username and password hash in data/users.db.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CutePHP CuteNews | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6662 has a medium severity rating due to its potential to expose sensitive files.
To fix CVE-2007-6662, upgrade to a version of CuteNews that is not affected by this directory traversal vulnerability.
Users of CuteNews version 2.6 are potentially affected by CVE-2007-6662.
CVE-2007-6662 can be exploited through remote attacks that utilize directory traversal techniques to read arbitrary files.
The nature of CVE-2007-6662 is a directory traversal vulnerability that allows unauthorized file access.