ID CVE-2007-6636
Type cve
Reporter NVD
Modified 2017-08-07T21:29:16
Description
Unspecified vulnerability in the StorageFarabDb module in Bitflu before 0.42 allows user-assisted remote attackers to create or append data to arbitrary files via a crafted .torrent file.
{"id": "CVE-2007-6636", "bulletinFamily": "NVD", "title": "CVE-2007-6636", "description": "Unspecified vulnerability in the StorageFarabDb module in Bitflu before 0.42 allows user-assisted remote attackers to create or append data to arbitrary files via a crafted .torrent file.", "published": "2008-01-03T19:46:00", "modified": "2017-08-07T21:29:16", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6636", "reporter": "NVD", "references": ["http://www.securityfocus.com/bid/27043", "http://bitflu.workaround.ch/ChangeLog.txt", "https://exchange.xforce.ibmcloud.com/vulnerabilities/39269"], "cvelist": ["CVE-2007-6636"], "type": "cve", "lastseen": "2017-08-08T11:24:24", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:bitflu:bitflu:0.41"], "cvelist": ["CVE-2007-6636"], "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "Unspecified vulnerability in the StorageFarabDb module in Bitflu before 0.42 allows user-assisted remote attackers to create or append data to arbitrary files via a crafted .torrent file.", "edition": 1, "enchantments": {}, "hash": "52e3d09f3750ac279529dd526cd9fbc910c79fddd5d31559acfd7b658e3ef43d", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "d32bb68eb9d6b2f1d21999de1f6f7f6a", "key": "cpe"}, {"hash": "1c213e117fdcf97fba6db81dd56f1c46", "key": "title"}, {"hash": "b0b047f26bc6ccae565b5690bfdb274f", "key": "cvelist"}, {"hash": "e9c0806484114e6f4b8a239d017659d7", "key": "references"}, {"hash": "e2c47daecdc1a677f13298aa8786b726", "key": "description"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "c29aabafd41989f5ee3caeae91eb6a31", "key": "href"}, {"hash": "bfe5fdc17782feb0f09c487f72581bf9", "key": "published"}, {"hash": "aa48a6bdcab91a600eca490863982fbd", "key": "cvss"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "51fad555528df148ff21eb60e468d1de", "key": "modified"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6636", "id": "CVE-2007-6636", "lastseen": "2016-09-03T09:55:40", "modified": "2008-11-15T02:05:39", "objectVersion": "1.2", "published": "2008-01-03T19:46:00", "references": ["http://xforce.iss.net/xforce/xfdb/39269", "http://www.securityfocus.com/bid/27043", "http://bitflu.workaround.ch/ChangeLog.txt"], "reporter": "NVD", "scanner": [], "title": "CVE-2007-6636", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T09:55:40"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "d32bb68eb9d6b2f1d21999de1f6f7f6a"}, {"key": "cvelist", "hash": "b0b047f26bc6ccae565b5690bfdb274f"}, {"key": "cvss", "hash": "aa48a6bdcab91a600eca490863982fbd"}, {"key": "description", "hash": "e2c47daecdc1a677f13298aa8786b726"}, {"key": "href", "hash": "c29aabafd41989f5ee3caeae91eb6a31"}, {"key": "modified", "hash": "de0d074ff0064c9bee296ef9e147c201"}, {"key": "published", "hash": "bfe5fdc17782feb0f09c487f72581bf9"}, {"key": "references", "hash": "45293b949f9f2a3ebc4116ac871177ef"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "1c213e117fdcf97fba6db81dd56f1c46"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "789537be81a7e53b47648583c66014151c2a947ea89ef75ad0671dde1e4f93dd", "viewCount": 0, "enchantments": {"score": {"value": 4.3, "vector": "NONE", "modified": "2017-08-08T11:24:24"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:39892"]}], "modified": "2017-08-08T11:24:24"}, "vulnersScore": 4.3}, "objectVersion": "1.3", "cpe": ["cpe:/a:bitflu:bitflu:0.41"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"osvdb": [{"lastseen": "2017-04-28T13:20:35", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 0.42 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nBitflu StorageFarabDb torrent File Security Bypass\n## References:\nVendor URL: http://bitflu.workaround.ch/\nVendor Specific News/Changelog Entry: http://bitflu.workaround.ch/ChangeLog.txt\n[Secunia Advisory ID:28238](https://secuniaresearch.flexerasoftware.com/advisories/28238/)\nISS X-Force ID: 39269\n[CVE-2007-6636](https://vulners.com/cve/CVE-2007-6636)\nBugtraq ID: 27043\n", "modified": "2007-12-27T15:19:16", "published": "2007-12-27T15:19:16", "href": "https://vulners.com/osvdb/OSVDB:39892", "id": "OSVDB:39892", "title": "Bitflu StorageFarabDb torrent File Security Bypass", "type": "osvdb", "cvss": {"score": 5.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}}]}