The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists.
References
Link | Resource |
---|---|
http://b2evolution.net/downloads/6-8-5 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/95700 | Third Party Advisory VDB Entry |
https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a | Issue Tracking Patch Third Party Advisory |
https://github.com/b2evolution/b2evolution/issues/36 | Issue Tracking Patch Third Party Advisory |
http://b2evolution.net/downloads/6-8-5 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/95700 | Third Party Advisory VDB Entry |
https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a | Issue Tracking Patch Third Party Advisory |
https://github.com/b2evolution/b2evolution/issues/36 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://b2evolution.net/downloads/6-8-5 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/95700 - Third Party Advisory, VDB Entry | |
References | () https://github.com/b2evolution/b2evolution/commit/e35f7c195d8c1103d2d981a48cda5ab45ecac48a - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/b2evolution/b2evolution/issues/36 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2017-01-23 07:59
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5539
Mitre link : CVE-2017-5539
CVE.ORG link : CVE-2017-5539
JSON object : View
Products Affected
b2evolution
- b2evolution
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')