Last Modified: Sept. 5, 2008
Joe Testa hellbent 01 webserver allows attackers to read files that are specified in the hellbent.prefs file by creating a file with a similar name in the web root, as demonstrated using (1) index.webroot and (2) index.ipallow.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: None
Base Score: 5.0
Exploitability Score: 10.0
Impact Score: 2.9
CVSS V2: AV:N/AC:L/Au:N/C:P/I:N/A:N
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:joe_testa:hellbent:0.1:*:*:*:*:*:*:* Part: a Vendor: joe_testa | Alle Schwachstellen für joe_testa |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:joe_testa:hellbent:0.1:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:joe_testa:hellbent:0.1:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="data" value="any"/> <prop key="data_influence" value="read"/> <prop key="range" value="remote"/> </set>