Directory traversal vulnerability in Spring Signage Xibo 1.2.x before 1.2.3 and 1.4.x before 1.4.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter to index.php.
References
Configurations
Configuration 1 (hide)
|
History
08 Dec 2025, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:springsignage:xibo:1.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.2.0:rc2:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:springsignage:xibo:1.4.1:*:*:*:*:*:*:* |
cpe:2.3:a:xibosignage:xibo:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.2.0:rc1:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.4.1:*:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.2.0:rc2:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:xibosignage:xibo:1.2.0:*:*:*:*:*:*:* |
| First Time |
Xibosignage
Xibosignage xibo |
21 Nov 2024, 01:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.baesystemsdetica.com.au/Research/Advisories/Xibo-Directory-Traversal-Vulnerability-%28DS-2013-00 - | |
| References | () https://bugs.launchpad.net/xibo/+bug/1093967 - Exploit |
07 Nov 2023, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
Information
Published : 2013-10-02 22:55
Updated : 2025-12-08 14:49
NVD link : CVE-2013-5979
Mitre link : CVE-2013-5979
CVE.ORG link : CVE-2013-5979
JSON object : View
Products Affected
xibosignage
- xibo
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
