vendor:
Lepton CMS
by:
John Page (HYP3RLINX)
8,8
CVSS
HIGH
Archive Directory Traversal
22
CWE
Product Name: Lepton CMS
Affected Version From: Lepton CMS 2.2.0
Affected Version To: Lepton CMS 2.2.1 (update)
Patch Exists: YES
Related CWE: N/A
CPE: 2.2.0,2.2.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2016
Lepton CMS Archive Directory Traversal
Lepton has feature that lets users install new modules, if malicious user uploads an archive and the module is not valid it will generate an error. However, the malicious archive will still get decompressed and no check is made for ../ characters in the file name allowing in arbitrary PHP files to be placed outside the intended target directory for installed modules. This can then be used to execute remote commands on the affected host system.
Mitigation:
Upgrade to Lepton CMS 2.2.2