Directory traversal in BigTree CMS - CVE-2017-9428
Published: June 6, 2017
Vulnerability identifier: #VU6904
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-9428
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: BigTree CMS
Affected software:
BigTree CMS
BigTree CMS
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via "directory" HTTP POST parameter to "/index.php/admin/ajax/developer/extensions/file-browser/" URL. A remote authenticated user with access to administrative area can use directory traversal sequences to view contents of arbitrary files on the system.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via "directory" HTTP POST parameter to "/index.php/admin/ajax/developer/extensions/file-browser/" URL. A remote authenticated user with access to administrative area can use directory traversal sequences to view contents of arbitrary files on the system.
How to mitigate CVE-2017-9428
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.