Описание
Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.
Ссылки
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:jack_slocum:ext_js:1.0_alpha1:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.11266
Средний
7.8 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Directory traversal vulnerability in examples/layout/feed-proxy.php in Jack Slocum Ext 1.0 alpha1 (Ext JS) allows remote attackers to read arbitrary files via a .. (dot dot) in the feed parameter. NOTE: analysis by third party researchers indicates that this issue might be platform dependent.
EPSS
Процентиль: 93%
0.11266
Средний
7.8 High
CVSS2
Дефекты
NVD-CWE-Other