CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
89.8%
Directory traversal vulnerability in session.rb in Hiki 0.8.0 through 0.8.6 allows remote attackers to delete arbitrary files via directory traversal sequences in the session ID, which is matched against an insufficiently restrictive regular expression before it is used to construct a filename that is marked for deletion at logout.
Vendor | Product | Version | CPE |
---|---|---|---|
hiki | hiki | 0.8.0 | cpe:2.3:a:hiki:hiki:0.8.0:*:*:*:*:*:*:* |
hiki | hiki | 0.8.1 | cpe:2.3:a:hiki:hiki:0.8.1:*:*:*:*:*:*:* |
hiki | hiki | 0.8.2 | cpe:2.3:a:hiki:hiki:0.8.2:*:*:*:*:*:*:* |
hiki | hiki | 0.8.3 | cpe:2.3:a:hiki:hiki:0.8.3:*:*:*:*:*:*:* |
hiki | hiki | 0.8.4 | cpe:2.3:a:hiki:hiki:0.8.4:*:*:*:*:*:*:* |
hiki | hiki | 0.8.5 | cpe:2.3:a:hiki:hiki:0.8.5:*:*:*:*:*:*:* |
hiki | hiki | 0.8.6 | cpe:2.3:a:hiki:hiki:0.8.6:*:*:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=430691
hikiwiki.org/en/advisory20070624.html
hikiwiki.org/hiki-0_8_6.patch
jvn.jp/jp/JVN%2305187780/index.html
osvdb.org/37469
secunia.com/advisories/25764
secunia.com/advisories/25874
www.debian.org/security/2007/dsa-1324
www.securityfocus.com/bid/24603
www.vupen.com/english/advisories/2007/2304
exchange.xforce.ibmcloud.com/vulnerabilities/35029