Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/701572 | US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities | Exploit |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-06-01 07:21
Updated : 2013-06-02 21:00
NVD link : CVE-2013-0136
Mitre link : CVE-2013-0136
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
mutiny
- mutiny_virtual_appliance
- mutiny_appliance
- mutiny