Описание
The TCLHTTPd service in Lyris ListManager before 8.9b allows remote attackers to obtain source code for arbitrary .tml (TCL) files via (1) a request with a trailing null byte (%00), which might also require (2) an authentication bypass step that involves a username with a trailing "@" characters.
Ссылки
- ExploitPatch
- ExploitPatchVendor Advisory
- ExploitPatch
- ExploitPatch
- Patch
- ExploitPatch
- ExploitPatchVendor Advisory
- ExploitPatch
- ExploitPatch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:lyris_technologies_inc:listmanager:5.0:*:*:*:*:*:*:*
cpe:2.3:a:lyris_technologies_inc:listmanager:6.0:*:*:*:*:*:*:*
cpe:2.3:a:lyris_technologies_inc:listmanager:7.0:*:*:*:*:*:*:*
cpe:2.3:a:lyris_technologies_inc:listmanager:8.0:*:*:*:*:*:*:*
cpe:2.3:a:lyris_technologies_inc:listmanager:8.8a:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.01156
Низкий
6.5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The TCLHTTPd service in Lyris ListManager before 8.9b allows remote attackers to obtain source code for arbitrary .tml (TCL) files via (1) a request with a trailing null byte (%00), which might also require (2) an authentication bypass step that involves a username with a trailing "@" characters.
EPSS
Процентиль: 78%
0.01156
Низкий
6.5 Medium
CVSS2
Дефекты
NVD-CWE-Other