Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.
References
Configurations
Information
Published : 2012-08-26 11:55
Updated : 2017-08-28 18:31
NVD link : CVE-2012-2227
Mitre link : CVE-2012-2227
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
pluxml
- pluxml