Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ph4j-q265-3h3m

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

EPSS

Процентиль: 93%
0.10547
Средний

Дефекты

CWE-22

Связанные уязвимости

ubuntu
почти 17 лет назад

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

redhat
почти 17 лет назад

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

nvd
почти 17 лет назад

Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.

debian
почти 17 лет назад

Directory traversal vulnerability in importxml.pl in Bugzilla before 2 ...

EPSS

Процентиль: 93%
0.10547
Средний

Дефекты

CWE-22