The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a | issue tracking third party advisory patch |
http://b2evolution.net/downloads/6-8-5 | patch vendor advisory |
http://www.securityfocus.com/bid/95700 | vdb entry third party advisory |
https://github.com/b2evolution/b2evolution/issues/36 | issue tracking third party advisory patch |