CVE-2018-18703

PhpTpoint Mailing Server Using File Handling 1.0 suffers from multiple Arbitrary File Read vulnerabilities in different sections that allow an attacker to read sensitive files on the system via directory traversal, bypassing the login page, as demonstrated by the Mailserver_filesystem/home.php coninb, consent, contrsh, condrft, or conspam parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phptpoint:mailing_server_using_file_handling:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:56

Type Values Removed Values Added
References () https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-10-29 12:29

Updated : 2024-11-21 03:56


NVD link : CVE-2018-18703

Mitre link : CVE-2018-18703

CVE.ORG link : CVE-2018-18703


JSON object : View

Products Affected

phptpoint

  • mailing_server_using_file_handling
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')