Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9rwq-2qv8-4jpv

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

EPSS

Процентиль: 80%
0.01459
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.5
nvd
больше 4 лет назад

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

EPSS

Процентиль: 80%
0.01459
Низкий

Дефекты

CWE-22