// For flags

CVE-2007-6453

RaidenHTTPD 2.0.19 - 'ulang' Remote Command Execution

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Directory traversal vulnerability in raidenhttpd-admin/workspace.php in RaidenHTTPD 2.0.19, when the WebAdmin function is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ulang parameter.

Vulnerabilidad de salto de directorio en raidenhttpd-admin/workspace.php en RaidenHTTPD 2.0.19, cuando la función WebAdmin está activada, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de la secuencia .. (punto punto) en el parámetro ulang.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-12-18 First Exploit
  • 2007-12-19 CVE Reserved
  • 2007-12-20 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Raiden Professional Servers
Search vendor "Raiden Professional Servers"
Raidenhttpd
Search vendor "Raiden Professional Servers" for product "Raidenhttpd"
2.0.19
Search vendor "Raiden Professional Servers" for product "Raidenhttpd" and version "2.0.19"
-
Affected