Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j383-pfwr-rvjw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in include/file_download.php in LearnLoop 2.0 beta7 allows remote attackers to read arbitrary files via a .. (dot dot) in the sFilePath parameter. NOTE: exploitation requires that the product is configured, but has zero files in the database.

Directory traversal vulnerability in include/file_download.php in LearnLoop 2.0 beta7 allows remote attackers to read arbitrary files via a .. (dot dot) in the sFilePath parameter. NOTE: exploitation requires that the product is configured, but has zero files in the database.

EPSS

Процентиль: 88%
0.0382
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
около 18 лет назад

Directory traversal vulnerability in include/file_download.php in LearnLoop 2.0 beta7 allows remote attackers to read arbitrary files via a .. (dot dot) in the sFilePath parameter. NOTE: exploitation requires that the product is configured, but has zero files in the database.

EPSS

Процентиль: 88%
0.0382
Низкий

Дефекты

CWE-22