Absolute path traversal vulnerability in downloadTrigger.jsp in Alkacon OpenCms before 6.2.2 allows remote authenticated users to download arbitrary files via an absolute pathname in the filePath parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/21193 | exploit third party advisory patch vendor advisory |
http://www.opencms.org/opencms/en/shownews.html?id=1002 | patch |
http://securityreason.com/securityalert/1302 | third party advisory |
http://www.securityfocus.com/archive/1/441182/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28000 | vdb entry |
http://o0o.nu/~meder/OpenCMS_multiple_vulnerabilities.txt | patch exploit |
http://www.opencms.org/export/download/opencms/opencms_6.2.2_src.zip | patch |