{ "schema_version": "1.4.0", "id": "GHSA-g5r5-mcgg-8jvc", "modified": "2022-05-01T18:38:07Z", "published": "2022-05-01T18:38:07Z", "aliases": [ "CVE-2007-5934" ], "details": "The LOB functionality in PEAR MDB2 before 2.5.0a1 interprets a request to store a URL string as a request to retrieve and store the contents of the URL, which might allow remote attackers to use MDB2 as an indirect proxy or obtain sensitive information via a URL into a form field in an MDB2 application, as demonstrated by a file:// URL or a URL for an intranet web site.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5934" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00434.html" }, { "type": "WEB", "url": "http://bugs.gentoo.org/show_bug.cgi?id=198446" }, { "type": "WEB", "url": "http://marc.info/?l=pear-cvs&m=117823082829114&w=2" }, { "type": "WEB", "url": "http://osvdb.org/42107" }, { "type": "WEB", "url": "http://pear.php.net/bugs/bug.php?id=10024" }, { "type": "WEB", "url": "http://pear.php.net/package/MDB2/download/2.5.0a1" }, { "type": "WEB", "url": "http://secunia.com/advisories/27572" }, { "type": "WEB", "url": "http://secunia.com/advisories/27626" }, { "type": "WEB", "url": "http://secunia.com/advisories/27983" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200712-05.xml" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/26382" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3806" } ], "database_specific": { "cwe_ids": [ "CWE-200" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-11-13T22:46:00Z" } }