A vulnerability was found in InvoicePlane up to 1.6.1. It has been classified as problematic. This affects the function download of the file invoices.php. The manipulation of the argument invoice leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.2-beta-1 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://vuldb.com/?id.288537 | vdb entry technical description |
https://vuldb.com/?ctiid.288537 | signature permissions required |
https://vuldb.com/?submit.459908 | third party advisory |
https://github.com/InvoicePlane/InvoicePlane/pull/1127 | patch issue tracking |
https://github.com/InvoicePlane/InvoicePlane/releases/tag/v1.6.2-beta-1 | patch |