Description
Multiple directory traversal vulnerabilities in Cybozu Office before 6.6 Build 1.3 and Share 360 before 2.5 Build 0.3 allow remote authenticated users to read arbitrary files via a .. (dot dot) sequence via the id parameter in (1) scripts/cbag/ag.exe or (2) scripts/s360v2/s360.exe.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Tan Chew Keong · textwebappscgi
https://www.exploit-db.com/exploits/2266
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28261
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21618
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/21623
Third Party Advisory third-party-advisory
x_refsource_jvn
http://jvn.jp/jp/JVN%2390420168/index.html
Various Sources x_refsource_confirm
http://cybozu.co.jp/products/dl/notice_060825/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/28262
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/28591
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1016759
Various Sources x_refsource_misc
http://vuln.sg/cybozu-en.html
Scores
EPSS
0.0754
EPSS Percentile
91.8%
Details
Status
published
Products (2)
cybozu/cybozu_office
< 6.6_build_1.2
cybozu/share_360
< 2.5_build_0.2
Published
Aug 31, 2006
Tracked Since
Feb 18, 2026