Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2014/Feb/14 | mailing list |
http://community.impresscms.org/modules/smartsection/item.php?itemid=675 | vendor advisory |
https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt | exploit |
http://www.securityfocus.com/bid/65279 | vdb entry |
http://osvdb.org/show/osvdb/102770 | vdb entry |