Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w4wx-r2h6-p94q

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.

EPSS

Процентиль: 99%
0.71903
Высокий

Связанные уязвимости

ubuntu
около 19 лет назад

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.

nvd
около 19 лет назад

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.

debian
около 19 лет назад

Webmin before 1.290 and Usermin before 1.220 calls the simplify_path f ...

EPSS

Процентиль: 99%
0.71903
Высокий