8.5
CVSSv2

CVE-2008-1000

Published: 18/03/2008 Updated: 15/10/2018
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
VMScore: 855
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Directory traversal vulnerability in ContentServer.py in the Wiki Server in Apple Mac OS X 10.5.2 (aka Leopard) allows remote authenticated users to write arbitrary files via ".." sequences in file attachments.

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x 10.5.2

apple mac os x server 10.5.2

Exploits

source: wwwsecurityfocuscom/bid/28278/info Apple Mac OS X Server Wiki Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data Exploiting this issue allows an attacker to access arbitrary files outside of the application's document root directory This can expose sensitive ...
Core Security Technologies Advisory - Three vulnerabilities discovered in the iCal application may allow un-authenticated attackers to execute arbitrary code on vulnerable systems with (and potentially without) the assistance from the end user of the application and may cause a denial of service condition iCal version 301 on MacOS X 1051 (Leop ...
Core Security Technologies Advisory - MacOS X Server 105, also known as Leopard Server, features a Wiki Server, which is a multiuser web application written in Python The Wiki Server is vulnerable to a path traversal attack, which can be exploited by non-privileged system users via a forged file upload to write arbitrary files on locations in the ...