{ "schema_version": "1.4.0", "id": "GHSA-w4p3-mf5w-2mr6", "modified": "2022-05-01T18:04:22Z", "published": "2022-05-01T18:04:22Z", "aliases": [ "CVE-2007-2519" ], "details": "Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0. NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2519" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34482" }, { "type": "WEB", "url": "http://osvdb.org/42108" }, { "type": "WEB", "url": "http://pear.php.net/advisory-20070507.txt" }, { "type": "WEB", "url": "http://pear.php.net/news/vulnerability2.php" }, { "type": "WEB", "url": "http://secunia.com/advisories/25372" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:110" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/24111" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-462-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/1926" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-05-22T19:30:00Z" } }