Directory traversal vulnerability in public/index.php in BIGACE Web CMS 2.6 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the cmd parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://forum.bigace.de/announcements/security-patch-for-bigace-2-6 | patch |
http://www.securityfocus.com/bid/35537 | vdb entry exploit |
http://securitytracker.com/id?1022489 | vdb entry exploit |
http://secunia.com/advisories/35643 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51444 | vdb entry |
http://osvdb.org/55510 | vdb entry |
http://www.bigace.de/Security-patch-for-BIGACE-2.6-released.html | patch vendor advisory |
http://www.exploit-db.com/exploits/9052 | exploit |