HTTP Exploit in eMLi Portal in AuroMeera Technometrix Pvt. Ltd. eMLi allows an Attacker to View Restricted Information or (even more seriously) execute powerful commands on the web server which can lead to a full compromise of the system via Directory Path Traversal, as demonstrated by reading core-emli/Storage. The affected versions are eMLi School Management 1.0, eMLi College Campus Management 1.0, and eMLi University Management 1.0.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97255 | Third Party Advisory VDB Entry |
https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html | Third Party Advisory |
http://www.securityfocus.com/bid/97255 | Third Party Advisory VDB Entry |
https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97255 - Third Party Advisory, VDB Entry | |
References | () https://sudoat.blogspot.in/2017/03/path-traversal-vulnerability-in-emli.html - Third Party Advisory |
Information
Published : 2017-03-29 20:59
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7258
Mitre link : CVE-2017-7258
CVE.ORG link : CVE-2017-7258
JSON object : View
Products Affected
auromeera
- emli
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')