The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists.
References
Link | Resource |
---|---|
http://b2evolution.net/downloads/6-8-5 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/95700 | Third Party Advisory VDB Entry |
https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a | Issue Tracking Patch Third Party Advisory |
https://github.com/b2evolution/b2evolution/issues/36 | Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-01-23 07:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-5539
Mitre link : CVE-2017-5539
CVE.ORG link : CVE-2017-5539
JSON object : View
Products Affected
b2evolution
- b2evolution
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')