Описание
Directory traversal vulnerability in source.php in Quick & Dirty PHPSource Printer 1.1 and earlier allows remote attackers to read arbitrary files via ".../...//" sequences in the file parameter, which are reduced to "../" when PHPSource Printer uses a regular expression to remove "../" sequences.
Ссылки
- ExploitVendor Advisory
- ExploitVendor Advisory
- Exploit
- ExploitVendor Advisory
- ExploitVendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:kaf_oseo:quick_and_dirty_phpsource_printer:1.1:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00298
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Directory traversal vulnerability in source.php in Quick & Dirty PHPSource Printer 1.1 and earlier allows remote attackers to read arbitrary files via ".../...//" sequences in the file parameter, which are reduced to "../" when PHPSource Printer uses a regular expression to remove "../" sequences.
EPSS
Процентиль: 53%
0.00298
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other