Full Disclosure mailing list archives
CVE Request:Directory Traversal in smilie module(MyBB <1.8.11)
From: Wester 95 <evilzyzeng () outlook com>
Date: Sun, 9 Apr 2017 13:23:09 +0000
Hi team, I would like to request one CVE for this vulnerability, thank you! ################################# Description: ============ product:MyBB Homepage:https://mybb.com/ vulnerable version:<1.8.11 Severity:Low risk =============== Proof of Concept: ============= vulnerability address:http://127.0.0.1/mybb_1810/Upload/admin/index.php?module=config-smilies&action=add_multiple vulnerability file directory:/webroot/mybb_1810/Upload/admin/modules/config/smilies.php vulnerability Code: Line 326 $path = $mybb->input['pathfolder']; Line 327 $dir = @opendir(MYBB_ROOT.$path); if we input "pathfolder" to "../../bypass/smile",Directory Traversal success! ============ Fixed: ============ This vulnerability was fixed in version 1.8.11 https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/ ============= Best regards, Zhiyang Zeng of Tencent security platform department _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- CVE Request:Directory Traversal in smilie module(MyBB <1.8.11) Wester 95 (Apr 11)