Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesn't verify users or sanitize the file path.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vapidlabs.com/advisory.php?v=202 | third party advisory exploit |
https://www.exploit-db.com/exploits/44501/ | exploit vdb entry third party advisory |
https://www.drupal.org/project/avatar_uploader | release notes vendor advisory |
https://www.drupal.org/project/avatar_uploader/issues/2957966 | vendor advisory |