Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mc4-f3f5-xmwp

Опубликовано: 02 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543.

A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543.

EPSS

Процентиль: 36%
0.00155
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-24

Связанные уязвимости

CVSS3: 4.3
nvd
больше 2 лет назад

A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543.

EPSS

Процентиль: 36%
0.00155
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-24