{"api_version":"1","generated_at":"2026-05-13T14:17:48+00:00","cve":"CVE-2008-1292","urls":{"html":"https://cve.report/CVE-2008-1292","api":"https://cve.report/api/cve/CVE-2008-1292.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1292","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1292"},"summary":{"title":"CVE-2008-1292","description":"ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-03-24 17:44:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-200","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"}}],"references":[{"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380","name":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"#471380 - viewvc: Multiple security issues - Debian Bug report logs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29460","name":"http://secunia.com/advisories/29460","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Gentoo update for viewvc - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28055","name":"http://www.securityfocus.com/bid/28055","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"ViewVC Multiple Remote Information Disclosure Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD","name":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"viewvc:        Subversion","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/0734/references","name":"http://www.vupen.com/english/advisories/2008/0734/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29176","name":"http://secunia.com/advisories/29176","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"ViewVC Multiple Security Issues - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://bugs.gentoo.org/show_bug.cgi?id=212288","name":"http://bugs.gentoo.org/show_bug.cgi?id=212288","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Bug 212288 - www-apps/viewvc < 1.0.5 Multiple issues (CVE-2008-{1290,1291,1292})","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.gentoo.org/glsa/glsa-200803-29.xml","name":"http://security.gentoo.org/glsa/glsa-200803-29.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ViewVC: Multiple vulnerabilities — Gentoo Linux Documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1292","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1292","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1292","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"gentoo","cpe5":"linux","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1292","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora","cpe6":"7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1292","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"fedora","cpe6":"8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"viewvc","cpe5":"viewvc","cpe6":"1.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"viewvc","cpe5":"viewvc","cpe6":"1.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:17:34.528Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"GLSA-200803-29","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200803-29.xml"},{"name":"29460","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29460"},{"name":"29176","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29176"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380"},{"name":"ADV-2008-0734","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0734/references"},{"name":"28055","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28055"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugs.gentoo.org/show_bug.cgi?id=212288"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-03-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2009-08-20T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"GLSA-200803-29","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200803-29.xml"},{"name":"29460","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29460"},{"name":"29176","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29176"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380"},{"name":"ADV-2008-0734","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0734/references"},{"name":"28055","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28055"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugs.gentoo.org/show_bug.cgi?id=212288"},{"tags":["x_refsource_CONFIRM"],"url":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-1292","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"GLSA-200803-29","refsource":"GENTOO","url":"http://security.gentoo.org/glsa/glsa-200803-29.xml"},{"name":"29460","refsource":"SECUNIA","url":"http://secunia.com/advisories/29460"},{"name":"29176","refsource":"SECUNIA","url":"http://secunia.com/advisories/29176"},{"name":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380","refsource":"CONFIRM","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380"},{"name":"ADV-2008-0734","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/0734/references"},{"name":"28055","refsource":"BID","url":"http://www.securityfocus.com/bid/28055"},{"name":"http://bugs.gentoo.org/show_bug.cgi?id=212288","refsource":"CONFIRM","url":"http://bugs.gentoo.org/show_bug.cgi?id=212288"},{"name":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD","refsource":"CONFIRM","url":"http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-1292","datePublished":"2008-03-24T17:00:00.000Z","dateReserved":"2008-03-12T00:00:00.000Z","dateUpdated":"2024-08-07T08:17:34.528Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-03-24 17:44:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-200","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"647BA336-5538-4972-9271-383A0EC9378E"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*","matchCriteriaId":"EE2027FA-357A-4BE3-9043-6DE8307C040A"},{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*","matchCriteriaId":"C8E8256F-3FB6-45B2-8F03-02A61C10FAF0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:viewvc:viewvc:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"793F6DB3-A6C2-4813-BD2D-AF34D85F6CCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:viewvc:viewvc:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"1B6F2BC5-D099-427C-9513-75551ABF1997"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1292","Ordinal":"1","Title":"CVE-2008-1292","CVE":"CVE-2008-1292","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1292","Ordinal":"1","NoteData":"ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.","Type":"Description","Title":"CVE-2008-1292"},{"CveYear":"2008","CveId":"1292","Ordinal":"2","NoteData":"2008-03-24","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1292","Ordinal":"3","NoteData":"2009-08-20","Type":"Other","Title":"Modified"}]}}}