CVE-2012-1617

Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a .. (dot dot) in the type parameter. NOTE: this vulnerability can be leveraged to upload arbitrary files.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html Exploit
http://osclass.org/2012/03/05/osclass-2-3-6/ Exploit Patch
http://secunia.com/advisories/48284 Vendor Advisory
http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability Exploit
http://www.openwall.com/lists/oss-security/2012/04/02/1
http://www.openwall.com/lists/oss-security/2012/04/02/6
http://www.openwall.com/lists/oss-security/2012/04/03/1 Exploit
http://www.openwall.com/lists/oss-security/2012/04/04/7 Exploit Patch
http://www.securityfocus.com/bid/52336 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b Exploit Patch
https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a Exploit Patch
https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 Exploit Patch
http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html Exploit
http://osclass.org/2012/03/05/osclass-2-3-6/ Exploit Patch
http://secunia.com/advisories/48284 Vendor Advisory
http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability Exploit
http://www.openwall.com/lists/oss-security/2012/04/02/1
http://www.openwall.com/lists/oss-security/2012/04/02/6
http://www.openwall.com/lists/oss-security/2012/04/03/1 Exploit
http://www.openwall.com/lists/oss-security/2012/04/04/7 Exploit Patch
http://www.securityfocus.com/bid/52336 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b Exploit Patch
https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a Exploit Patch
https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:juan_ramon:osclass:*:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:delta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:37

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html - Exploit () http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html - Exploit
References () http://osclass.org/2012/03/05/osclass-2-3-6/ - Exploit, Patch () http://osclass.org/2012/03/05/osclass-2-3-6/ - Exploit, Patch
References () http://secunia.com/advisories/48284 - Vendor Advisory () http://secunia.com/advisories/48284 - Vendor Advisory
References () http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability - Exploit () http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability - Exploit
References () http://www.openwall.com/lists/oss-security/2012/04/02/1 - () http://www.openwall.com/lists/oss-security/2012/04/02/1 -
References () http://www.openwall.com/lists/oss-security/2012/04/02/6 - () http://www.openwall.com/lists/oss-security/2012/04/02/6 -
References () http://www.openwall.com/lists/oss-security/2012/04/03/1 - Exploit () http://www.openwall.com/lists/oss-security/2012/04/03/1 - Exploit
References () http://www.openwall.com/lists/oss-security/2012/04/04/7 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2012/04/04/7 - Exploit, Patch
References () http://www.securityfocus.com/bid/52336 - Exploit () http://www.securityfocus.com/bid/52336 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73754 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73754 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73755 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73755 -
References () https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b - Exploit, Patch () https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b - Exploit, Patch
References () https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a - Exploit, Patch () https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a - Exploit, Patch
References () https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 - Exploit, Patch () https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 - Exploit, Patch

Information

Published : 2012-09-26 00:55

Updated : 2024-11-21 01:37


NVD link : CVE-2012-1617

Mitre link : CVE-2012-1617

CVE.ORG link : CVE-2012-1617


JSON object : View

Products Affected

juan_ramon

  • osclass
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')