1 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in payments/ideal_process.php in the iDEAL transaction handler in ViArt Shopping Cart allows remote attackers to have an unknown impact via directory traversal sequences in the filename parameter to the createCertFingerprint function. NOTE: this issue is disputed by CVE because PHP encounters a fatal function-call error on a direct request for payments/ideal_process.php ** IMPUGNADA ** Vulnerabilidad de salto de directorio en payments/ideal_process.php en el manejador de transacciones iDEAL de ViArt Shopping Cart permite a atacantes remotos tener un impacto desconocido mediante secuencias de salto de directorio en el parámetro filename de la función createCertFingerprint. NOTA: CVE niega este problema porque PHP encuentra un error fatal de llamada a función en una petición directa de payments/ideal_process.php. • http://securityreason.com/securityalert/3212 http://www.securityfocus.com/archive/1/481658/100/0/threaded http://www.securityfocus.com/archive/1/481848 http://www.securityfocus.com/bid/25998 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •