Fraunhofer Fit

Bscw

3 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.45%
  • Veröffentlicht 25.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

config_converters.py in BSCW (Basic Support for Cooperative Work) 3.x and versions before 4.06 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name during filename conversion.

Exploit
  • EPSS 7.13%
  • Veröffentlicht 25.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of BSCW (Basic Support for Cooperative Work) 3.x and possibly version 4 enables user self registration, which could allow remote attackers to upload files and possibly join a user community that was intended to be closed.

  • EPSS 3.17%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space.