Описание
DBHcms v1.2.0 has an Arbitrary file read vulnerability in dbhcms\mod\mod.editor.php $_GET['file'] is filename,and as there is no filter function for security, you can read any file's content.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:dbhcms_project:dbhcms:1.2.0:*:*:*:*:*:*:*
EPSS
Процентиль: 50%
0.00271
Низкий
4.9 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-639
Связанные уязвимости
github
больше 3 лет назад
DBHcms v1.2.0 has an Arbitrary file read vulnerability in dbhcms\mod\mod.editor.php $_GET['file'] is filename,and as there is no filter function for security, you can read any file's content.
EPSS
Процентиль: 50%
0.00271
Низкий
4.9 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-639