Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-485f-hww5-mmf8

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).

thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).

EPSS

Процентиль: 89%
0.05036
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 17 лет назад

thumbsup.php in Thumbs-Up 1.12, as used in LightNEasy "no database" (aka flat) and SQLite 1.2.2 and earlier, allows remote attackers to copy, rename, and read arbitrary files via directory traversal sequences in the image parameter with a modified cache_dir parameter containing a %00 (encoded null byte).

EPSS

Процентиль: 89%
0.05036
Низкий

Дефекты

CWE-22