The add function in www/Lib/Lib/Action/Admin/TplAction.class.php in Gxlcms v1.1.4 allows remote attackers to read arbitrary files via a crafted index.php?s=Admin-Tpl-ADD-id request, related to Lib/Common/Admin/function.php.
References
Link | Resource |
---|---|
https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 | Exploit Third Party Advisory |
https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TonyKentClark/MyCodeAudit/blob/master/gxlcms1.1.4 - Exploit, Third Party Advisory |
Information
Published : 2018-07-28 23:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14685
Mitre link : CVE-2018-14685
CVE.ORG link : CVE-2018-14685
JSON object : View
Products Affected
gxlcms
- gxlcms
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor