← Retour aux CVEs
CVE-2009-5067
N/ADescription
Directory traversal vulnerability in html2ps before 1.0b6 allows remote attackers to read arbitrary files via a .. (dot dot) in the "include file" SSI directive. NOTE: this issue only might be a vulnerability in limited scenarios, such as if html2ps is invoked by a web application, or if a user-assisted attacker provides filenames whose contents could cause a denial of service, such as certain devices.
Details CVE
Score CVSS v3.1N/A
Publie10/10/2012
Derniere modification4/11/2025
Sourcenvd
Observations honeypot0
Produits affectes
html2ps_project:html2ps
Faiblesses (CWE)
CWE-22
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548633(secalert@redhat.com)
http://packetstormsecurity.org/files/81614/html2ps-1.0-beta5-File-Disclosure.html(secalert@redhat.com)
http://user.it.uu.se/~jan/html2ps-1.0b7.tar.gz(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:161(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/10/05/1(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/10/05/5(secalert@redhat.com)
http://www.securityfocus.com/bid/36524(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=526513(secalert@redhat.com)
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548633(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.org/files/81614/html2ps-1.0-beta5-File-Disclosure.html(af854a3a-2127-422b-91ae-364da2661108)
http://user.it.uu.se/~jan/html2ps-1.0b7.tar.gz(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2012:161(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/10/05/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/10/05/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/36524(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=526513(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.