An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
References
Link | Resource |
---|---|
https://metalamin.github.io/MachForm-not-0-day-EN/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44804/ | Exploit Third Party Advisory VDB Entry |
https://www.machform.com/blog-machform-423-security-release/ | Release Notes Vendor Advisory |
Configurations
History
01 Jul 2021, 12:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:machform:machform:4.2.3:*:*:*:*:*:*:* |
Information
Published : 2018-05-26 22:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-6409
Mitre link : CVE-2018-6409
CVE.ORG link : CVE-2018-6409
JSON object : View
Products Affected
machform
- machform
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')