CVE-2017-1000490

Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
References
Link Resource
https://github.com/mautic/mautic/releases/tag/2.12.0 Exploit Release Notes Third Party Advisory
https://github.com/mautic/mautic/releases/tag/2.12.0 Exploit Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:acquia:mautic:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.9.0:beta:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.10.0:beta:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:acquia:mautic:2.11.0:beta:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:mautic:mautic:2.11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:04

Type Values Removed Values Added
References () https://github.com/mautic/mautic/releases/tag/2.12.0 - Exploit, Release Notes, Third Party Advisory () https://github.com/mautic/mautic/releases/tag/2.12.0 - Exploit, Release Notes, Third Party Advisory

Information

Published : 2018-01-03 17:29

Updated : 2024-11-21 03:04


NVD link : CVE-2017-1000490

Mitre link : CVE-2017-1000490

CVE.ORG link : CVE-2017-1000490


JSON object : View

Products Affected

mautic

  • mautic

acquia

  • mautic
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')