Directory traversal vulnerability in frontend/core/engine/javascript.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the module parameter to frontend/js.php.
References
Configurations
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/files/109709/Fork-CMS-3.2.4-Cross-Site-Scripting-Local-File-Inclusion.html - Exploit | |
References | () http://www.fork-cms.com/blog/detail/fork-cms-3-2-5-released - | |
References | () http://www.securityfocus.com/bid/51972 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/73169 - | |
References | () https://github.com/forkcms/forkcms/commit/a9986b86c53de0582248b39605660fbba0c21a29 - Patch |
Information
Published : 2012-02-24 13:55
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1207
Mitre link : CVE-2012-1207
CVE.ORG link : CVE-2012-1207
JSON object : View
Products Affected
fork-cms
- fork_cms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')