Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-5463
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-15 Oct, 2007 | 22:17
Updated At-15 Oct, 2018 | 21:45

ideal_process.php in the iDEAL payment module in ViArt Shop 3.3 beta and earlier might allow remote attackers to obtain the pathname for certificate and key files via an "iDEAL transaction", possibly involving fopen error messages for nonexistent files, a different issue than CVE-2007-5364. NOTE: this can be leveraged for reading certificate or key files if an installation places these files under the web document root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

viart
viart
>>shop>>Versions up to 3.3_beta(inclusive)
cpe:2.3:a:viart:shop:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/40151cve@mitre.org
N/A
http://secunia.com/advisories/27199cve@mitre.org
Patch
Vendor Advisory
http://securityreason.com/securityalert/3233cve@mitre.org
N/A
http://www.securityfocus.com/archive/1/481978/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/25998cve@mitre.org
N/A
http://www.viart.com/ideal_process_script_fix_for_release_32_and_33_beta.htmlcve@mitre.org
Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/37048cve@mitre.org
N/A
Change History
0Changes found

Details not found