ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
History

Wed, 20 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
Description ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.
Title ContentKeeper Web Appliance < 125.10 Arbitrary File Access via mimencode
Weaknesses CWE-552
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-20T15:31:57.963Z

Updated: 2025-08-20T19:22:01.553Z

Reserved: 2025-08-18T20:45:05.163Z

Link: CVE-2009-10005

cve-icon Vulnrichment

Updated: 2025-08-20T19:21:54.895Z

cve-icon NVD

Status : Received

Published: 2025-08-20T16:15:32.100

Modified: 2025-08-20T16:15:32.100

Link: CVE-2009-10005

cve-icon Redhat

No data.