CVE-2006-0707

high

Description

PyBlosxom before 1.3.2, when running on certain webservers, allows remote attackers to read arbitrary files via an HTTP request with multiple leading / (slash) characters, which is accessed using the PATH_INFO variable.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/24730

http://www.vupen.com/english/advisories/2006/0571

http://www.securityfocus.com/bid/16641

http://sourceforge.net/project/shownotes.php?release_id=391800

http://secunia.com/advisories/18858

Details

Source: Mitre, NVD

Published: 2006-02-15

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High

EPSS

EPSS: 0.00427