Описание
WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
Ссылки
- Issue TrackingRelease NotesVendor Advisory
- Patch
- ExploitThird Party Advisory
- Issue TrackingRelease NotesVendor Advisory
- Patch
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.2 (включая)
cpe:2.3:a:webidsupport:webid:*:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00504
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
EPSS
Процентиль: 66%
0.00504
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-22