CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
89.1%
Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a … (dot dot) in the type parameter. NOTE: this vulnerability can be leveraged to upload arbitrary files.
Vendor | Product | Version | CPE |
---|---|---|---|
juan_ramon | osclass | * | cpe:2.3:a:juan_ramon:osclass:*:*:*:*:*:*:*:* |
juan_ramon | osclass | 1.1 | cpe:2.3:a:juan_ramon:osclass:1.1:*:*:*:*:*:*:* |
juan_ramon | osclass | 1.1 | cpe:2.3:a:juan_ramon:osclass:1.1:rc:*:*:*:*:*:* |
juan_ramon | osclass | 1.2 | cpe:2.3:a:juan_ramon:osclass:1.2:alpha:*:*:*:*:*:* |
juan_ramon | osclass | 1.2 | cpe:2.3:a:juan_ramon:osclass:1.2:beta:*:*:*:*:*:* |
juan_ramon | osclass | 1.2 | cpe:2.3:a:juan_ramon:osclass:1.2:delta:*:*:*:*:*:* |
juan_ramon | osclass | 2.0 | cpe:2.3:a:juan_ramon:osclass:2.0:*:*:*:*:*:*:* |
juan_ramon | osclass | 2.0 | cpe:2.3:a:juan_ramon:osclass:2.0:rc:*:*:*:*:*:* |
juan_ramon | osclass | 2.0.1 | cpe:2.3:a:juan_ramon:osclass:2.0.1:*:*:*:*:*:*:* |
juan_ramon | osclass | 2.0.2 | cpe:2.3:a:juan_ramon:osclass:2.0.2:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/bugtraq/2012-03/0024.html
osclass.org/2012/03/05/osclass-2-3-6/
secunia.com/advisories/48284
www.codseq.it/advisories/osclass_directory_traversal_vulnerability
www.openwall.com/lists/oss-security/2012/04/02/1
www.openwall.com/lists/oss-security/2012/04/02/6
www.openwall.com/lists/oss-security/2012/04/03/1
www.openwall.com/lists/oss-security/2012/04/04/7
www.securityfocus.com/bid/52336
exchange.xforce.ibmcloud.com/vulnerabilities/73754
exchange.xforce.ibmcloud.com/vulnerabilities/73755
github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b
github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a
github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1