CVE-2015-2071

Directory traversal vulnerability in cm/newui/blog/export.jsp in eTouch SamePage Enterprise Edition 4.4.0.0.239 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filepath parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:etouch:samepage:4.4.0.0.239:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 02:26

Type Values Removed Values Added
References () http://osvdb.org/show/osvdb/118357 - () http://osvdb.org/show/osvdb/118357 -
References () http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html - Exploit () http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-Injection-File-Read.html - Exploit
References () http://seclists.org/fulldisclosure/2015/Feb/47 - Exploit () http://seclists.org/fulldisclosure/2015/Feb/47 - Exploit
References () http://www.exploit-db.com/exploits/36089 - Exploit () http://www.exploit-db.com/exploits/36089 - Exploit
References () http://www.securityfocus.com/bid/74887 - () http://www.securityfocus.com/bid/74887 -

Information

Published : 2015-02-24 17:59

Updated : 2024-11-21 02:26


NVD link : CVE-2015-2071

Mitre link : CVE-2015-2071

CVE.ORG link : CVE-2015-2071


JSON object : View

Products Affected

etouch

  • samepage
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')