Directory traversal vulnerability in framework/source/resource/qx/test/part/delay.php in QooxDoo 1.3 and possibly other versions, as used in eyeOS 2.2 and 2.3, and possibly other products allows remote attackers to read arbitrary files via ..%2f (encoded dot dot) sequences in the file parameter.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/ - | |
References | () http://osvdb.org/71719 - Exploit | |
References | () http://osvdb.org/71721 - | |
References | () http://secunia.com/advisories/43818 - Vendor Advisory | |
References | () http://secunia.com/advisories/43997 - Vendor Advisory | |
References | () http://www.autosectools.com/Advisories/eyeOS.2.3_Local.File.Inclusion_173.html - Exploit | |
References | () http://www.exploit-db.com/exploits/17127 - Exploit | |
References | () http://www.securityfocus.com/bid/47184 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66574 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66575 - |
Information
Published : 2011-04-18 18:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-1715
Mitre link : CVE-2011-1715
CVE.ORG link : CVE-2011-1715
JSON object : View
Products Affected
eyeos
- eyeos
qooxdoo
- qooxdoo
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')