We found results for “”
WS-2023-0125
Good to know:
Date: April 28, 2023
unilogies/bumsys prior to 2.2.0 is vulnerable to Path Traversal. The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Path Traversal: '..filename'
CWE-29Top Fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |