Search criteria

4 vulnerabilities found for web_wiz_newspad by webwiz

CVE-2009-5019 (GCVE-0-2009-5019)

Vulnerability from nvd – Published: 2010-12-01 16:00 – Updated: 2024-08-07 07:24
VLAI?
Summary
Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "newspad-newspad-info-disclosure(55043)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
          },
          {
            "name": "15544",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/15544"
          },
          {
            "name": "10637",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/10637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "newspad-newspad-info-disclosure(55043)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
        },
        {
          "name": "15544",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/15544"
        },
        {
          "name": "10637",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/10637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5019",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "newspad-newspad-info-disclosure(55043)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
            },
            {
              "name": "15544",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/15544"
            },
            {
              "name": "10637",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/10637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5019",
    "datePublished": "2010-12-01T16:00:00.000Z",
    "dateReserved": "2010-12-01T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:24:54.017Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0466 (GCVE-0-2008-0466)

Vulnerability from nvd – Published: 2008-01-28 23:00 – Updated: 2024-08-07 07:46
VLAI?
Summary
Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files. NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/486868/100… mailing-listx_refsource_BUGTRAQ
https://www.exploit-db.com/exploits/4970 exploitx_refsource_EXPLOIT-DB
https://www.exploit-db.com/exploits/4971 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/27419 vdb-entryx_refsource_BID
http://www.bugreport.ir/?/29 x_refsource_MISC
http://securityreason.com/securityalert/3584 third-party-advisoryx_refsource_SREASON
http://www.bugreport.ir/?/31 x_refsource_MISC
http://securitytracker.com/id?1019267 vdb-entryx_refsource_SECTRACK
http://www.webwizguide.com/webwizrichtexteditor/k… x_refsource_MISC
http://www.securityfocus.com/archive/1/486866/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:46:54.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
          },
          {
            "name": "4970",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4970"
          },
          {
            "name": "4971",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4971"
          },
          {
            "name": "27419",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27419"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.bugreport.ir/?/29"
          },
          {
            "name": "3584",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3584"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.bugreport.ir/?/31"
          },
          {
            "name": "1019267",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019267"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
          },
          {
            "name": "20080123 Web Wiz Forums Directory traversal",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files.  NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
        },
        {
          "name": "4970",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4970"
        },
        {
          "name": "4971",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4971"
        },
        {
          "name": "27419",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27419"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.bugreport.ir/?/29"
        },
        {
          "name": "3584",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3584"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.bugreport.ir/?/31"
        },
        {
          "name": "1019267",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019267"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
        },
        {
          "name": "20080123 Web Wiz Forums Directory traversal",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0466",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files.  NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
            },
            {
              "name": "4970",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4970"
            },
            {
              "name": "4971",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4971"
            },
            {
              "name": "27419",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27419"
            },
            {
              "name": "http://www.bugreport.ir/?/29",
              "refsource": "MISC",
              "url": "http://www.bugreport.ir/?/29"
            },
            {
              "name": "3584",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3584"
            },
            {
              "name": "http://www.bugreport.ir/?/31",
              "refsource": "MISC",
              "url": "http://www.bugreport.ir/?/31"
            },
            {
              "name": "1019267",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019267"
            },
            {
              "name": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp",
              "refsource": "MISC",
              "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
            },
            {
              "name": "20080123 Web Wiz Forums Directory traversal",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0466",
    "datePublished": "2008-01-28T23:00:00.000Z",
    "dateReserved": "2008-01-28T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:46:54.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5019 (GCVE-0-2009-5019)

Vulnerability from cvelistv5 – Published: 2010-12-01 16:00 – Updated: 2024-08-07 07:24
VLAI?
Summary
Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "newspad-newspad-info-disclosure(55043)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
          },
          {
            "name": "15544",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/15544"
          },
          {
            "name": "10637",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/10637"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-24T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "newspad-newspad-info-disclosure(55043)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
        },
        {
          "name": "15544",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/15544"
        },
        {
          "name": "10637",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/10637"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5019",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Web Wiz NewsPad stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for database/NewsPad.mdb."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "newspad-newspad-info-disclosure(55043)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55043"
            },
            {
              "name": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/view/84294/webwiznewspad-disclose.txt"
            },
            {
              "name": "15544",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/15544"
            },
            {
              "name": "10637",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/10637"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5019",
    "datePublished": "2010-12-01T16:00:00.000Z",
    "dateReserved": "2010-12-01T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:24:54.017Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0466 (GCVE-0-2008-0466)

Vulnerability from cvelistv5 – Published: 2008-01-28 23:00 – Updated: 2024-08-07 07:46
VLAI?
Summary
Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files. NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/486868/100… mailing-listx_refsource_BUGTRAQ
https://www.exploit-db.com/exploits/4970 exploitx_refsource_EXPLOIT-DB
https://www.exploit-db.com/exploits/4971 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/27419 vdb-entryx_refsource_BID
http://www.bugreport.ir/?/29 x_refsource_MISC
http://securityreason.com/securityalert/3584 third-party-advisoryx_refsource_SREASON
http://www.bugreport.ir/?/31 x_refsource_MISC
http://securitytracker.com/id?1019267 vdb-entryx_refsource_SECTRACK
http://www.webwizguide.com/webwizrichtexteditor/k… x_refsource_MISC
http://www.securityfocus.com/archive/1/486866/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:46:54.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
          },
          {
            "name": "4970",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4970"
          },
          {
            "name": "4971",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/4971"
          },
          {
            "name": "27419",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27419"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.bugreport.ir/?/29"
          },
          {
            "name": "3584",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3584"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.bugreport.ir/?/31"
          },
          {
            "name": "1019267",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1019267"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
          },
          {
            "name": "20080123 Web Wiz Forums Directory traversal",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-01-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files.  NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
        },
        {
          "name": "4970",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4970"
        },
        {
          "name": "4971",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/4971"
        },
        {
          "name": "27419",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27419"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.bugreport.ir/?/29"
        },
        {
          "name": "3584",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3584"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.bugreport.ir/?/31"
        },
        {
          "name": "1019267",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1019267"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
        },
        {
          "name": "20080123 Web Wiz Forums Directory traversal",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0466",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Web Wiz RTE_file_browser.asp in, as used in Web Wiz Rich Text Editor 4.0, Web Wiz Forums 9.07, and Web Wiz Newspad 1.02, does not require authentication, which allows remote attackers to list directories and read files.  NOTE: this can be leveraged for listings outside the configured directory tree by exploiting a separate directory traversal vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20080123 Web Wiz Rich Text Editor Directory traversal + HTM/HTML filecreation on the server",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486868/100/0/threaded"
            },
            {
              "name": "4970",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4970"
            },
            {
              "name": "4971",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/4971"
            },
            {
              "name": "27419",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27419"
            },
            {
              "name": "http://www.bugreport.ir/?/29",
              "refsource": "MISC",
              "url": "http://www.bugreport.ir/?/29"
            },
            {
              "name": "3584",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3584"
            },
            {
              "name": "http://www.bugreport.ir/?/31",
              "refsource": "MISC",
              "url": "http://www.bugreport.ir/?/31"
            },
            {
              "name": "1019267",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1019267"
            },
            {
              "name": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp",
              "refsource": "MISC",
              "url": "http://www.webwizguide.com/webwizrichtexteditor/kb/release_notes.asp"
            },
            {
              "name": "20080123 Web Wiz Forums Directory traversal",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/486866/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0466",
    "datePublished": "2008-01-28T23:00:00.000Z",
    "dateReserved": "2008-01-28T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:46:54.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}