Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
References
Link | Resource |
---|---|
https://github.com/mautic/mautic/releases/tag/2.12.0 | Exploit Release Notes Third Party Advisory |
https://github.com/mautic/mautic/releases/tag/2.12.0 | Exploit Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/mautic/mautic/releases/tag/2.12.0 - Exploit, Release Notes, Third Party Advisory |
Information
Published : 2018-01-03 17:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000490
Mitre link : CVE-2017-1000490
CVE.ORG link : CVE-2017-1000490
JSON object : View
Products Affected
mautic
- mautic
acquia
- mautic
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')