FKIE_CVE-2007-1849

Vulnerability from fkie_nvd - Published: 2007-04-03 16:19 - Updated: 2026-04-23 00:35
Severity ?
Summary
Directory traversal vulnerability in 404.php in Drake CMS allows remote attackers to include and execute arbitrary local arbitrary files via a .. (dot dot) in the d_private parameter. NOTE: some of these details are obtained from third party information. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS."
Impacted products
Vendor Product Version
drake_team drake_cms 0.3.7
drake_team drake_cms 0.3.7_beta

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A605E0F-C5F3-4E2C-8DAE-63B52C60C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:drake_team:drake_cms:0.3.7_beta:*:*:*:*:*:*:*",
              "matchCriteriaId": "61285E3A-BB8E-4506-99EE-D95312DB8B96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in 404.php in Drake CMS allows remote attackers to include and execute arbitrary local arbitrary files via a .. (dot dot) in the d_private parameter.  NOTE: some of these details are obtained from third party information.  NOTE: Drake CMS has only a beta version available, and the vendor has previously stated \"We do not consider security reports valid until the first official release of Drake CMS.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de escalado de directorio en     el 404.php del Drake CMS permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n mediante la inclusi\u00f3n de .. (punto punto) en el par\u00e1metro d_private. NOTA: algunos de los detalles se obtienen a partir de la informaci\u00f3n de terceros. NOTA: Drake CMS s\u00f3lo tiene disponible una versi\u00f3n beta y el proveedor ha indicado previamente \"No se van a considerar reportes de seguridad v\u00e1lidos hasta la primera versi\u00f3n oficial del Drake CMS\"."
    }
  ],
  "id": "CVE-2007-1849",
  "lastModified": "2026-04-23T00:35:47.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-03T16:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/464272"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23215"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33331"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/464272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33331"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "An apposite mailing list\n(drakecms-security@lists.sourceforge.net) has been created to discuss all publicly disclosed security reports (mostly from National Vulnerability Database and Security Focus); for the valid security reports temporary solutions will be offered even before the official patch release. Specific patches will be released for all critical vulnerabilities (available through the automatic update feature).\n\nThis vulnerability has been fixed in Drake CMS v0.3.8 Beta, previous versions\u2019 users can update their software directly from the administrative backend.",
      "lastModified": "2007-04-17T00:00:00",
      "organization": "Drake CMS"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…