SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.
References
Link | Resource |
---|---|
https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478 | Exploit Patch Third Party Advisory |
https://sourceforge.net/p/seeddms/code/ci/d68c922152e8a8060dd7fc3ebdd7af685e270e36/ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-06 16:15
Updated : 2022-06-14 09:15
NVD link : CVE-2022-28478
Mitre link : CVE-2022-28478
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
seeddms
- seeddms