PhpTpoint Mailing Server Using File Handling 1.0 suffers from multiple Arbitrary File Read vulnerabilities in different sections that allow an attacker to read sensitive files on the system via directory traversal, bypassing the login page, as demonstrated by the Mailserver_filesystem/home.php coninb, consent, contrsh, condrft, or conspam parameter.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-10-29 05:29
Updated : 2018-12-04 11:02
NVD link : CVE-2018-18703
Mitre link : CVE-2018-18703
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
phptpoint
- mailing_server_using_file_handling