Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x93g-j874-2hqr

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.

module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.

EPSS

Процентиль: 76%
0.00959
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
больше 16 лет назад

module.php in ezContents 2.0.3 allows remote attackers to bypass the directory traversal protection mechanism to include and execute arbitrary local files via "....//" (doubled dot dot slash) sequences in the link parameter, which is not properly filtered using the str_replace function.

EPSS

Процентиль: 76%
0.00959
Низкий

Дефекты

CWE-22