Roxy Fileman 1.4.5 for .NET is vulnerable to path traversal. A remote attacker can write uploaded files to arbitrary locations via the RENAMEFILE action. This can be leveraged for code execution by uploading a specially crafted Windows shortcut file and writing the file to the Startup folder (because an incomplete blacklist of file extensions allows Windows shortcut files to be uploaded).
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
http://www.roxyfileman.com/download | Release Notes |
http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
http://www.roxyfileman.com/download | Release Notes |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/155666/Roxy-Fileman-1.4.5-For-.NET-Directory-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.roxyfileman.com/download - Release Notes |
Information
Published : 2019-12-16 17:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19731
Mitre link : CVE-2019-19731
CVE.ORG link : CVE-2019-19731
JSON object : View
Products Affected
roxyfileman
- roxy_fileman
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')