Attacker controlled files can be uploaded to arbitrary locations on the web server's filesystem by abusing a path traversal vulnerability.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://korelogic.com/Resources/Advisories/KL-001-2024-006.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2024/Aug/4 | |
http://www.openwall.com/lists/oss-security/2024/08/08/7 |