[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2012-2227Date: (C)2012-08-26   (M)2018-02-19


Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score : Impact Score : 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  





Reference:
EXPLOIT-DB-18828
http://archives.neohapsis.com/archives/bugtraq/2012-05/0011.html
SECUNIA-49026
BID-53348
OSVDB-81638
http://telechargements.pluxml.org/changelog
http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6
https://www.htbridge.com/advisory/HTB23086
pluxml-index-file-include(75330)

CPE    1
cpe:/a:pluxml:pluxml:5.1.5
CWE    1
CWE-22

© 2013 SecPod Technologies