Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vhv4-mr2w-hc59

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in lib/classes/message_class.php in Papoo CMS 3.6, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read and possibly execute arbitrary files via a .. (dot dot) in the pfadhier parameter. NOTE: some of these details are obtained from third party information.

Directory traversal vulnerability in lib/classes/message_class.php in Papoo CMS 3.6, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read and possibly execute arbitrary files via a .. (dot dot) in the pfadhier parameter. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 86%
0.02707
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
почти 17 лет назад

Directory traversal vulnerability in lib/classes/message_class.php in Papoo CMS 3.6, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read and possibly execute arbitrary files via a .. (dot dot) in the pfadhier parameter. NOTE: some of these details are obtained from third party information.

EPSS

Процентиль: 86%
0.02707
Низкий

Дефекты

CWE-22