PhpTpoint Mailing Server Using File Handling 1.0 suffers from multiple Arbitrary File Read vulnerabilities in different sections that allow an attacker to read sensitive files on the system via directory traversal, bypassing the login page, as demonstrated by the Mailserver_filesystem/home.php coninb, consent, contrsh, condrft, or conspam parameter.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-10-29 12:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18703
Mitre link : CVE-2018-18703
CVE.ORG link : CVE-2018-18703
JSON object : View
Products Affected
phptpoint
- mailing_server_using_file_handling
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')