Vulnerability CVE-2013-1641


Published: 2014-10-26

Description:
Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the selitems[] parameter in a download_selected action to index.php.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Quixplorer -> Quixplorer 

 References:
https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt
https://github.com/realtimeprojects/quixplorer/commit/7ac119cebd3b6bfe16a30fd1d5290127310a4436
https://github.com/realtimeprojects/quixplorer/blob/v2.5.5/doc/RELEASES.md
https://github.com/realtimeprojects/quixplorer
http://xforce.iss.net/xforce/xfdb/89059
http://secunia.com/advisories/55725

Copyright 2024, cxsecurity.com

 

Back to Top