CVE-2017-5539

The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists.
References
Link Resource
http://b2evolution.net/downloads/6-8-5 Patch Vendor Advisory
http://www.securityfocus.com/bid/95700 Third Party Advisory VDB Entry
https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a Issue Tracking Patch Third Party Advisory
https://github.com/b2evolution/b2evolution/issues/36 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:b2evolution:b2evolution:6.8.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-01-23 07:59

Updated : 2024-02-04 19:11


NVD link : CVE-2017-5539

Mitre link : CVE-2017-5539

CVE.ORG link : CVE-2017-5539


JSON object : View

Products Affected

b2evolution

  • b2evolution
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')