The LOB functionality in PEAR MDB2 before 2.5.0a1 interprets a request to store a URL string as a request to retrieve and store the contents of the URL, which might allow remote attackers to use MDB2 as an indirect proxy or obtain sensitive information via a URL into a form field in an MDB2 application, as demonstrated by a file:// URL or a URL for an intranet web site.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/26382 | vdb-entry x_refsource_BID |
| http://bugs.gentoo.org/show_bug.cgi?id=198446 | x_refsource_CONFIRM |
| http://pear.php.net/package/MDB2/download/2.5.0a1 | x_refsource_CONFIRM |
| http://osvdb.org/42107 | vdb-entry x_refsource_OSVDB |
| http://security.gentoo.org/glsa/glsa-200712-05.xml | vendor-advisory x_refsource_GENTOO |
| http://pear.php.net/bugs/bug.php?id=10024 | x_refsource_CONFIRM |
| http://secunia.com/advisories/27983 | third-party-advisory x_refsource_SECUNIA |
| http://secunia.com/advisories/27626 | third-party-advisory x_refsource_SECUNIA |
| http://marc.info/?l=pear-cvs&m=117823082829114&w=2 | mailing-list x_refsource_MLIST |
| http://secunia.com/advisories/27572 | third-party-advisory x_refsource_SECUNIA |
| https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00434.html | vendor-advisory x_refsource_FEDORA |
| http://www.vupen.com/english/advisories/2007/3806 | vdb-entry x_refsource_VUPEN |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|