Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-28gc-vvw4-44jg

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence.

files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence.

EPSS

Процентиль: 87%
0.03471
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 16 лет назад

files.php in Vivvo CMS 4.1.5.1 allows remote attackers to conduct directory traversal attacks and read arbitrary files via the file parameter with "logs/" in between two . (dot) characters, which is filtered into a "../" sequence.

EPSS

Процентиль: 87%
0.03471
Низкий

Дефекты

CWE-22