YzmCMS 3.6 allows remote attackers to discover the full path via a direct request to application/install/templates/s1.php.
References
Link | Resource |
---|---|
https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md | Exploit Third Party Advisory |
https://kongxin.gitbook.io/yzmcms-3-6-bug/ | Exploit Third Party Advisory |
https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md | Exploit Third Party Advisory |
https://kongxin.gitbook.io/yzmcms-3-6-bug/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md - Exploit, Third Party Advisory | |
References | () https://kongxin.gitbook.io/yzmcms-3-6-bug/ - Exploit, Third Party Advisory |
Information
Published : 2018-02-26 03:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7479
Mitre link : CVE-2018-7479
CVE.ORG link : CVE-2018-7479
JSON object : View
Products Affected
yzmcms
- yzmcms
CWE
CWE-668
Exposure of Resource to Wrong Sphere