ID: CVE-2002-2084

Last Modified: Sept. 5, 2008

Directory traversal vulnerability in index.php of Portix 0.4.02 allows remote attackers to read arbitrary files via a .. (dot dot) in the (1) l and (2) topic parameters.

Access Vector: Network

Access Complexity: Low

Authentication: None

Confidentiality Impact: Partial

Integrity Impact: None

Availability Impact: None

Base Score: 5.0

Exploitability Score: 10.0

Impact Score: 2.9

CVSS V2: AV:N/AC:L/Au:N/C:P/I:N/A:N

Specialize CVSS-Score

NVD-CWE-Other

Condition Configuration
OR
OR
Alle Schwachstellen für portix-php
                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:portix-php:portix-php:0.4.2:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
    <prop key="range" value="remote"/>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:portix-php:portix-php:0.4.2:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
    <prop key="data" value="any"/>
    <prop key="data_influence" value="read"/>
    <prop key="range" value="remote"/>
</set>