Vulnerability Details : CVE-2014-5258
Potential exploit
Directory traversal vulnerability in showTempFile.php in webEdition CMS before 6.3.9.0 Beta allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter.
Vulnerability category: Directory traversal
Products affected by CVE-2014-5258
- cpe:2.3:a:webedition:webedition_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5258
51.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2014-5258
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5258
-
https://www.htbridge.com/advisory/HTB23227
Path Traversal in webEdition - HTB23227 Security Advisory | ImmuniWebExploit
-
http://www.securityfocus.com/archive/1/533465/100/0/threaded
SecurityFocus
-
http://www.webedition.org/de/aktuelles/webedition-cms/webEdition-6.3.9-Beta-erschienen
webEdition 6.3.9 Beta erschienen – webEditionVendor Advisory
-
http://packetstormsecurity.com/files/128301/webEdition-6.3.8.0-Path-Traversal.html
webEdition 6.3.8.0 Path Traversal ≈ Packet StormExploit
-
http://www.webedition.org/de/webedition-cms/versionshistorie/webedition-6/version-6.3.9.0
Seite nicht gefunden (Fehler 404) – webEditionVendor Advisory
Jump to