Описание
In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.0 (включая)
cpe:2.3:a:ens:webgalamb:*:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04453
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
In Webgalamb through 7.0, a system/ajax.php "wgmfile restore" directory traversal vulnerability could lead to arbitrary code execution by authenticated administrator users, because PHP files are restored under the document root directory.
EPSS
Процентиль: 89%
0.04453
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-22