Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p4gj-wxqq-wmc7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

EPSS

Процентиль: 93%
0.09677
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and earlier allows remote attackers to read or include arbitrary files via ".." sequences in the GLOBALS[type_urls] parameter, which could then be used to execute arbitrary code via resultant direct static code injection in the file parameter to spip_acces_doc.php3.

debian
почти 20 лет назад

Directory traversal vulnerability in Spip_RSS.PHP in SPIP 1.8.2g and e ...

EPSS

Процентиль: 93%
0.09677
Низкий