vendor:
YesWiki
by:
HaHwul
7,5
CVSS
HIGH
Path Traversal
22
CWE
Product Name: YesWiki
Affected Version From: yeswiki 0.2
Affected Version To: yeswiki 0.2
Patch Exists: NO
Related CWE: none
CPE: a:yeswiki:yeswiki
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian [Wheezy]
2015
YESWIKI 0.2 – Path Traversal
YESWIKI Path Traversal Exploit allows an attacker to download a file from the vulnerable server. The attacker can send a specially crafted HTTP request containing directory traversal strings (e.g. “../”) to the vulnerable server and download any file from the server.
Mitigation:
Ensure that user input is validated and sanitized before being used in file system operations.