SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.
References
Link | Resource |
---|---|
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 | Exploit Patch Third Party Advisory |
https://sourceforge.net/p/seeddms/code/ci/d68c922152e8a8060dd7fc3ebdd7af685e270e36/ | Patch Vendor Advisory |
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 | Exploit Patch Third Party Advisory |
https://sourceforge.net/p/seeddms/code/ci/d68c922152e8a8060dd7fc3ebdd7af685e270e36/ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 - Exploit, Patch, Third Party Advisory | |
References | () https://sourceforge.net/p/seeddms/code/ci/d68c922152e8a8060dd7fc3ebdd7af685e270e36/ - Patch, Vendor Advisory |
Information
Published : 2022-06-06 23:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28478
Mitre link : CVE-2022-28478
CVE.ORG link : CVE-2022-28478
JSON object : View
Products Affected
seeddms
- seeddms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')