Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/701572 | US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities | Exploit |
http://www.kb.cert.org/vuls/id/701572 | US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities | Exploit |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/701572 - US Government Resource | |
References | () https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities - Exploit |
Information
Published : 2013-06-01 14:21
Updated : 2024-11-21 01:46
NVD link : CVE-2013-0136
Mitre link : CVE-2013-0136
CVE.ORG link : CVE-2013-0136
JSON object : View
Products Affected
mutiny
- mutiny
- mutiny_appliance
- mutiny_virtual_appliance
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')