CVE-2018-7482

The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&target=l1_../configuration.php&download=1 request. The specific pathname ../configuration.php should be base64 encoded for a valid attack. NOTE: the vendor disputes this issue because only files under the media-manager path can be downloaded, and the documentation indicates that sensitive information does not belong there. Nonetheless, 2.8.1 has additional blocking of .php downloads
Configurations

Configuration 1 (hide)

cpe:2.3:a:joomlaworks:k2:2.8.0:*:*:*:*:joomla\!:*:*

History

21 Nov 2024, 04:12

Type Values Removed Values Added
References () https://exploit-db.com/exploits/44188 - Broken Link () https://exploit-db.com/exploits/44188 - Broken Link
References () https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-report-on-k2-v2-8-0 - Vendor Advisory () https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-report-on-k2-v2-8-0 - Vendor Advisory

07 Nov 2023, 03:01

Type Values Removed Values Added
Summary ** DISPUTED ** The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&target=l1_../configuration.php&download=1 request. The specific pathname ../configuration.php should be base64 encoded for a valid attack. NOTE: the vendor disputes this issue because only files under the media-manager path can be downloaded, and the documentation indicates that sensitive information does not belong there. Nonetheless, 2.8.1 has additional blocking of .php downloads. The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&target=l1_../configuration.php&download=1 request. The specific pathname ../configuration.php should be base64 encoded for a valid attack. NOTE: the vendor disputes this issue because only files under the media-manager path can be downloaded, and the documentation indicates that sensitive information does not belong there. Nonetheless, 2.8.1 has additional blocking of .php downloads

Information

Published : 2018-02-28 07:29

Updated : 2024-11-21 04:12


NVD link : CVE-2018-7482

Mitre link : CVE-2018-7482

CVE.ORG link : CVE-2018-7482


JSON object : View

Products Affected

joomlaworks

  • k2
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')