Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/53348 | vdb entry |
https://www.htbridge.com/advisory/HTB23086 | |
http://www.exploit-db.com/exploits/18828 | exploit |
http://archives.neohapsis.com/archives/bugtraq/2012-05/0011.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75330 | vdb entry |
http://secunia.com/advisories/49026 | third party advisory vendor advisory |
http://osvdb.org/81638 | vdb entry |
http://www.pluxml.org/article59/sortie-de-pluxml-5-1-6 | |
http://telechargements.pluxml.org/changelog |