[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-2227

Date: (C)2012-08-26   (M)2017-08-29 


Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
EXPLOIT-DB-18828
http://archives.neohapsis.com/archives/bugtraq/2012-05/0011.html
SECUNIA-49026
BID-53348
OSVDB-81638
http://telechargements.pluxml.org/changelog
http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6
https://www.htbridge.com/advisory/HTB23086
pluxml-index-file-include(75330)

CPE    1
cpe:/a:pluxml:pluxml:5.1.5
CWE    1
CWE-22

© 2013 SecPod Technologies