MetInfo 7.0 beta is affected by a file modification vulnerability. Attackers can delete and modify ini files in app/system/language/admin/language_general.class.php and app/system/include/function/file.func.php.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/23.html | Third Party Advisory |
https://github.com/cby234/cve_request/issues/1 | Exploit Issue Tracking Third Party Advisory |
https://github.com/cby234/cve_request/issues/2 | Exploit Issue Tracking Third Party Advisory |
https://cwe.mitre.org/data/definitions/23.html | Third Party Advisory |
https://github.com/cby234/cve_request/issues/1 | Exploit Issue Tracking Third Party Advisory |
https://github.com/cby234/cve_request/issues/2 | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://cwe.mitre.org/data/definitions/23.html - Third Party Advisory | |
References | () https://github.com/cby234/cve_request/issues/1 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/cby234/cve_request/issues/2 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2021-05-24 18:15
Updated : 2024-11-21 05:12
NVD link : CVE-2020-20907
Mitre link : CVE-2020-20907
CVE.ORG link : CVE-2020-20907
JSON object : View
Products Affected
metinfo
- metinfo
microsoft
- windows
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')