Описание
Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | not-affected | |
| devel | not-affected | 3.2.0.0~rc2-1 |
| feisty | ignored | end of life, was needed |
| gutsy | released | 2.22.1-2.2ubuntu1.7.10.1 |
| hardy | released | 2.22.1-2.2ubuntu1.8.04.1 |
| intrepid | released | 3.0.4.1-2ubuntu1.1 |
| upstream | released | 3.0.5 |
Показывать по
Ссылки на источники
7.1 High
CVSS2
Связанные уязвимости
Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
Directory traversal vulnerability in importxml.pl in Bugzilla before 2 ...
Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
7.1 High
CVSS2