CVE-2007-0888

Kiwi CatTools <3.2.0 - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in the TFTP server in Kiwi CatTools before 3.2.0 beta allows remote attackers to read arbitrary files, and upload files to arbitrary locations, via ..// (dot dot) sequences in the pathname argument to an FTP (1) GET or (2) PUT command.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Sergey Gordeychik · textremotewindows
https://www.exploit-db.com/exploits/3380

References (9)

Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/33162
Various Sources x_refsource_confirm
http://www.kiwisyslog.com/kb/idx/5/178/article/
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/32398
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/459500/100/0/threaded
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0536
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22490
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/459933/100/0/threaded
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2236
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24103

Scores

EPSS 0.0695
EPSS Percentile 91.5%

Details

Status published
Products (1)
kiwi_enterprises/kiwi_cattools
Published Feb 12, 2007
Tracked Since Feb 18, 2026