lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <PS1PR04MB1001D351675C29EF096C50F0DF0E0@PS1PR04MB1001.apcprd04.prod.outlook.com> Date: Sun, 9 Apr 2017 13:23:09 +0000 From: Wester 95 <evilzyzeng@...look.com> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] CVE Request:Directory Traversal in smilie module(MyBB <1.8.11) Hi team, I would like to request one CVE for this vulnerability, thank you! ################################# Description: ============ product:MyBB Homepage:https://mybb.com/ vulnerable version:<1.8.11 Severity:Low risk =============== Proof of Concept: ============= vulnerability address:http://127.0.0.1/mybb_1810/Upload/admin/index.php?module=config-smilies&action=add_multiple vulnerability file directory:/webroot/mybb_1810/Upload/admin/modules/config/smilies.php vulnerability Code: Line 326 $path = $mybb->input['pathfolder']; Line 327 $dir = @opendir(MYBB_ROOT.$path); if we input "pathfolder" to "../../bypass/smile",Directory Traversal success! ============ Fixed: ============ This vulnerability was fixed in version 1.8.11 https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/ ============= Best regards, Zhiyang Zeng of Tencent security platform department _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists