Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
References
Link | Resource |
---|---|
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php | Exploit Third Party Advisory |
Configurations
Information
Published : 2017-10-02 18:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-14979
Mitre link : CVE-2017-14979
JSON object : View
CWE
Products Affected
gxlcms
- gxlcms