FKIE_CVE-2012-1471
Vulnerability from fkie_nvd - Published: 2012-10-01 23:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in catalogue_file.php in ocPortal before 7.1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ocportal:ocportal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035AB70D-4E36-4E93-9D9C-7E5125061135",
"versionEndIncluding": "7.1.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E33E262D-A9F8-4DEC-B342-D1E05F43CC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE0F25AC-E8BF-4D51-A03A-5B828A238EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0303909-3BC2-4EDF-99CC-7FFCB3553F16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B5B50C76-A63F-44B5-8FEC-20A09286C8C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "418F0475-2A58-46C4-ABF9-CBDE61784293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "80B5CF5B-5159-4165-8DFE-BE813AD5BB34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "40D9388E-144E-47BF-A0D6-8E57398886D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "38A49321-D89B-4081-8A52-B62960952C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "218418AF-404F-439C-80DC-8CD4F970D3BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BA7FA2EF-8669-461C-A31F-F50567530115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FD05E0DA-9E4F-48B5-BB70-1E62C0CC6F3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DE393D-9F84-4E17-BE66-7A57E5F28336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "98ECC9A9-A3EB-4A24-80BA-EAFD44EF2B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "63C4CD14-B9B3-4336-9015-A3419B475622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "86E76DCF-147B-4E1B-A7AF-A85598050F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "022B5576-9125-4F68-9703-972EF8C093C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "30C71D27-DA94-40FD-94D7-FE00EB75F97B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "8A12BB7C-4B40-4A85-B8CA-56FA6B07EAD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "C748040D-9F25-4D11-8A4A-F8AEA184B47B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C93F6E7-8401-4A25-A79F-C46F9B12D0FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:beta1:*:*:*:*:*:*",
"matchCriteriaId": "9BC691BF-8E21-4772-8C80-1CF0E3F65204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:beta2:*:*:*:*:*:*",
"matchCriteriaId": "D3340E35-75AE-42B9-AB36-1D667773B73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1B0A267F-185A-41DB-AFF1-AEED4B23B76F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8785922E-AE60-4143-8E1C-3110F1035300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "09DA9DF7-1FB7-4ADD-A1B0-90DBCE506FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31F47423-DCD0-4094-9E80-DDA914928CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7DFE2A-0538-4A3C-B47D-C848BFF2860A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "69677C20-C350-4999-97EB-C19D240C7700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F63A9CDA-7AE4-4BA5-936A-9638C5B08913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8E968932-138D-42AA-8B5C-67F8E7A8613A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "99058B8A-EFF9-4F66-89C4-F50BAE21CE19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C19FCCA1-D4D9-487A-A200-2D2B06464012",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B541D4-9D8A-404A-AFF4-5C2A20895697",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2205664B-3698-4C5A-AFFF-7576DAA64EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "5010BF58-C1A6-4E33-A316-D9131AE5C206",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2D622F-FED9-4891-AFB7-D630462C0B06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "22FCE9FB-C431-4DAB-BFCC-C229EDE641BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0.2:beta1:*:*:*:*:*:*",
"matchCriteriaId": "EE7031C9-2DAF-4A31-B22D-53BF45BECA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0BF6B098-BEFC-4B86-B6CE-C091B05990D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:5.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "6380D539-6266-4626-9079-FC5571D30000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED538256-BFAC-4CD6-99BB-4701BAA31481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "38A6F245-E6AB-4BEA-9974-419C0F7B467A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "220BE7CB-D80B-4E1A-92F1-2067368DBB7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F3E0F464-0B92-4C82-A664-34AB12179287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B6948726-5934-4BBD-A913-6E9B7F0D2994",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "419792D9-620A-432F-9CFC-A7C19BA07E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14C00C62-787F-4470-8F36-26C18F58C288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F0BBCB42-CBF9-49B2-9634-CA7C8FA69379",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6D260A49-A274-4C95-B89C-BF7613CECF32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A169D7E0-118E-45CD-8E03-F9835B585D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09418F06-9ECA-431B-9FDE-6550F1CED93C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE40A6D7-A56F-47C8-9DD3-743998E35876",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80C9D04-4221-4AD3-B6E5-B2B59B7CB35B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3A4ADF-66F1-4B6D-9BF7-38D6BBF38ACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F19B65E-3488-47B2-A21E-2F19F9DF7495",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1:beta1:*:*:*:*:*:*",
"matchCriteriaId": "77FBB8F9-8EC2-46AD-8A0A-FA665ED1F9AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "65594010-CEBE-4655-B57F-AB0224D356E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE54653D-8DE4-4CDE-BD1C-280494859CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B21F925B-E195-4579-8707-9D0D89EC0B87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ocportal:ocportal:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8375E1C2-FF7E-4993-AF42-9572B7EB5E17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in catalogue_file.php in ocPortal before 7.1.6 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en catalogue_file.php en ocPortal anteriores a v7.1.6, permite a atacantes remotos incluir y ejecutar ficheros locales de su elecci\u00f3n al utilizar caracteres .. (punto punto) en el par\u00e1metro file."
}
],
"id": "CVE-2012-1471",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-10-01T23:55:00.923",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ocportal.com/site/news/view/ocportal-security-update.htm"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://www.htbridge.com/advisory/HTB23078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://ocportal.com/site/news/view/new-releases/ocportal-7-1-6-released.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://ocportal.com/site/news/view/ocportal-security-update.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.htbridge.com/advisory/HTB23078"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…