Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rjjv-8xhv-gg57

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.

The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.

EPSS

Процентиль: 100%
0.89981
Высокий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 15 лет назад

The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.

EPSS

Процентиль: 100%
0.89981
Высокий

Дефекты

CWE-22