Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
References
Link | Resource |
---|---|
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-03 01:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14979
Mitre link : CVE-2017-14979
CVE.ORG link : CVE-2017-14979
JSON object : View
Products Affected
gxlcms
- gxlcms
CWE