Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2cc-c38q-h9rw

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.

Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.

EPSS

Процентиль: 85%
0.02343
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
около 17 лет назад

Multiple directory traversal vulnerabilities in Aperto Blog 0.1.1 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) action parameter to admin.php and the (2) get parameter to index.php. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.

EPSS

Процентиль: 85%
0.02343
Низкий

Дефекты

CWE-22