Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2008-0466
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files. NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:webwiz:web_wiz_forums:9.07:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:webwiz:web_wiz_newspad:1.02:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:webwiz:web_wiz_rich_text_editor:4.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.bugreport.ir/?/31
- http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp
- http://securitytracker.com/id?1019267
- http://www.bugreport.ir/?/29
- http://securityreason.com/securityalert/3584
- http://www.securityfocus.com/bid/27419
- https://www.exploit-db.com/exploits/4971
- https://www.exploit-db.com/exploits/4970
- http://www.securityfocus.com/archive/1/486868/100/0/threaded
- http://www.securityfocus.com/archive/1/486866/100/0/threaded