New issue
Advanced search Search tips

Issue 895796 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Oct 16
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 1
Type: Bug-Security



Sign in to add a comment

Chromium: Vulnerability reported in apache-win32

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Oct 16

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: apache-win32
Package Version: [cpe:/a:apache:http_server:2.2.25]

Advisory: CVE-2007-4723
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2007-4723
  CVSS severity score: 7.5/10.0
  Confidence: high
  Description:

Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page.


 
Status: WontFix (was: Unconfirmed)
"Ragnarok Online Control Panel" is not applicable to Chromium.
Project Member

Comment 2 by sheriffbot@chromium.org, Today (17 hours ago)

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment