CVE-2017-14979

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:gxlcms:gxlcms:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:13

Type Values Removed Values Added
References () https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php - Exploit, Third Party Advisory () https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php - Exploit, Third Party Advisory

Information

Published : 2017-10-03 01:29

Updated : 2024-11-21 03:13


NVD link : CVE-2017-14979

Mitre link : CVE-2017-14979

CVE.ORG link : CVE-2017-14979


JSON object : View

Products Affected

gxlcms

  • gxlcms