Vulnerability CVE-2013-0136


Published: 2013-06-01

Description:
Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.

See advisories in our WLB2 database:
Topic
Author
Date
High
Mutiny 5 Arbitrary File Upload
Juan vazquez
17.05.2013

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.5/10
10/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Mutiny -> Mutiny 
Mutiny -> Mutiny virtual appliance 
Mutiny -> Mutiny appliance 

 References:
http://www.kb.cert.org/vuls/id/701572
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities

Copyright 2024, cxsecurity.com

 

Back to Top