CMS ISWEB 3.5.3 is vulnerable to directory traversal and local file download, as demonstrated by moduli/downloadFile.php?file=oggetto_documenti/../.././inc/config.php (one can take the control of the application because credentials are present in that config.php file).
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2018090248 | Exploit Third Party Advisory |
https://cxsecurity.com/issue/WLB-2018090248 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://cxsecurity.com/issue/WLB-2018090248 - Exploit, Third Party Advisory |
Information
Published : 2018-09-28 00:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-14957
Mitre link : CVE-2018-14957
CVE.ORG link : CVE-2018-14957
JSON object : View
Products Affected
isweb
- isweb
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')