A vulnerability classified as critical has been found in Shibang Communications IP Network Intercom Broadcasting System 1.0. This affects an unknown part of the file /php/busyscreenshotpush.php. The manipulation of the argument jsondata[callee]/jsondata[imagename] leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259065 was assigned to this vulnerability.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://vuldb.com/?id.259065 | vdb entry technical description |
https://vuldb.com/?ctiid.259065 | signature permissions required |
https://vuldb.com/?submit.308510 | third party advisory |
https://github.com/garboa/cve_3/blob/main/file_put_content.md | exploit |