[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-1641Date: (C)2014-10-27   (M)2023-12-22


Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the selitems[] parameter in a download_selected action to index.php.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.8
Exploit Score: 10.0
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: NONE
Availability: NONE
  
Reference:
SECUNIA-55725
https://github.com/realtimeprojects/quixplorer
https://github.com/realtimeprojects/quixplorer/blob/v2.5.5/doc/RELEASES.md
https://github.com/realtimeprojects/quixplorer/commit/7ac119cebd3b6bfe16a30fd1d5290127310a4436
https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt
quixplorer-cve20131641-dir-traversal(89059)

CWE    1
CWE-22

© SecPod Technologies