An issue in the component /stl/actions/download?filePath of SSCMS v7.3.1 allows attackers to execute a directory traversal.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize multiple internal "../" sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
http://sscms.com | product |
https://gist.github.com/CTRLCCT/c9b5aab78a179a2d92a41889a588c933 | third party advisory |