header-logo
Suggest Exploit
vendor:
Elastic Path
by:
SecurityFocus
7.5
CVSS
HIGH
Local File-Include, Arbitrary File-Upload, Directory-Traversal
20, 434, 22
CWE
Product Name: Elastic Path
Affected Version From: 4.1
Affected Version To: 4.1.2001
Patch Exists: NO
Related CWE: N/A
CPE: elasticpath
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008

Elastic Path Multiple Input-Validation Vulnerabilities

Elastic Path is prone to multiple input-validation vulnerabilities because it fails to properly sanitize user-supplied input. Exploiting these issues can allow attackers to access potentially sensitive information or to execute arbitrary script code in the context of the webserver process. Other attacks may also be possible.

Mitigation:

Input validation should be used to ensure that untrusted data is not allowed to affect the application's logic. Additionally, applications should be designed to use the least-privileged account possible.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/28352/info
 
Elastic Path is prone to multiple input-validation vulnerabilities because it fails to properly sanitize user-supplied input.
 
These issues include:
 
- A local file-include vulnerability.
- An arbitrary file-upload vulnerability.
- A directory-traversal vulnerability.
 
Note that attackers must be logged into the application to exploit issues.
 
Exploiting these issues can allow attackers to access potentially sensitive information or to execute arbitrary script code in the context of the webserver process. Other attacks may also be possible.
 
Elastic Path 4.1 and 4.1.1 are vulnerable; other versions may also be affected. 

http://www.example.com/elasticpath_dir/manager/fileManager.jsp?dir=../../../../WINDOWS/system32/config/