Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
References
Link | Resource |
---|---|
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php | Exploit Third Party Advisory |
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php - Exploit, Third Party Advisory |
Information
Published : 2017-10-03 01:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14979
Mitre link : CVE-2017-14979
CVE.ORG link : CVE-2017-14979
JSON object : View
Products Affected
gxlcms
- gxlcms
CWE