Multiple directory traversal vulnerabilities in SeedDMS (formerly LetoDMS and MyDMS) before 4.3.4 allow (1) remote authenticated users with access to the LogManagement functionality to read arbitrary files via a .. (dot dot) in the logname parameter to out/out.LogManagement.php or (2) remote attackers to write to arbitrary files via a .. (dot dot) in the fileId parameter to op/op.AddFile2.php. NOTE: vector 2 can be leveraged to execute arbitrary code by using CVE-2014-2278.
References
Configurations
History
21 Nov 2024, 02:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2014-03/0101.html - | |
References | () http://osvdb.org/show/osvdb/104466 - | |
References | () http://packetstormsecurity.com/files/125726 - | |
References | () http://sourceforge.net/p/seeddms/code/ci/master/tree/CHANGELOG - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/66256 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/91831 - |
Information
Published : 2014-10-17 23:55
Updated : 2024-11-21 02:05
NVD link : CVE-2014-2279
Mitre link : CVE-2014-2279
CVE.ORG link : CVE-2014-2279
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')