[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-2227Date: (C)2012-08-26   (M)2023-12-22


Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
EXPLOIT-DB-18828
http://archives.neohapsis.com/archives/bugtraq/2012-05/0011.html
SECUNIA-49026
BID-53348
OSVDB-81638
http://telechargements.pluxml.org/changelog
http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6
https://www.htbridge.com/advisory/HTB23086
pluxml-index-file-include(75330)

CPE    1
cpe:/a:pluxml:pluxml
CWE    1
CWE-22

© SecPod Technologies