Описание
extras/curltest.php in Zen Cart 1.3.8 and 1.3.8a, and possibly other versions, allows remote attackers to read arbitrary files via a file:// URI. NOTE: some of these details are obtained from third party information.
Ссылки
- Vendor Advisory
- Exploit
- Vendor Advisory
- Vendor Advisory
- Exploit
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:zen-cart:zen_cart:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:zen-cart:zen_cart:1.3.8a:*:*:*:*:*:*:*
EPSS
Процентиль: 74%
0.00819
Низкий
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
почти 4 года назад
extras/curltest.php in Zen Cart 1.3.8 and 1.3.8a, and possibly other versions, allows remote attackers to read arbitrary files via a file:// URI. NOTE: some of these details are obtained from third party information.
EPSS
Процентиль: 74%
0.00819
Низкий
5 Medium
CVSS2
Дефекты
CWE-20