[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-1617

Date: (C)2012-09-25   (M)2017-08-29
 
CVSS Score: 6.4Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: NONE











Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a .. (dot dot) in the type parameter. NOTE: this vulnerability can be leveraged to upload arbitrary files.

Reference:
http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html
SECUNIA-48284
BID-52336
http://www.openwall.com/lists/oss-security/2012/04/02/1
http://www.openwall.com/lists/oss-security/2012/04/02/6
http://www.openwall.com/lists/oss-security/2012/04/03/1
http://www.openwall.com/lists/oss-security/2012/04/04/7
http://osclass.org/2012/03/05/osclass-2-3-6/
http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability
https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b
https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a
https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1
osclass-directory-traversal(73754)
osclass-file-upload(73755)

CWE    1
CWE-22

© 2013 SecPod Technologies