๐Ÿ” CVE Alert

CVE-2009-10005

UNKNOWN 0.0

ContentKeeper Web Appliance < 125.10 Arbitrary File Access via mimencode

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.

CWE CWE-552
Vendor contentkeeper technologies
Product web appliance
Published Aug 20, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for contentkeeper technologies web appliance

Be the first to know when new unknown vulnerabilities affecting contentkeeper technologies web appliance are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ContentKeeper Technologies / Web Appliance
* < 125.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/admin/http/contentkeeper_fileaccess.rb exploit-db.com: https://www.exploit-db.com/exploits/16923 aushack.com: http://www.aushack.com/200904-contentkeeper.txt web.archive.org: https://web.archive.org/web/20100325220542/http://www.contentkeeper.com/ vulncheck.com: https://www.vulncheck.com/advisories/contentkeeper-web-appliance-arbitrary-file-access-via-mimencode

Credits

Patrick Webster (aushack)