Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j9vp-hmqw-qv3c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 99%
0.73422
Высокий

Связанные уязвимости

CVSS3: 7.5
nvd
около 5 лет назад

LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 99%
0.73422
Высокий