cvelist/2018/15xxx/CVE-2018-15536.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2018-08-19 14:03:14 -04:00
{
2019-03-17 23:49:44 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-15536",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2018-08-24 15:03:26 -04:00
{
2019-03-17 23:49:44 +00:00
"lang": "eng",
"value": "/filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 does not properly validate file paths in archives, allowing for the extraction of crafted archives to overwrite arbitrary files via an extract action, aka Directory Traversal."
2018-08-24 15:03:26 -04:00
}
2019-03-17 23:49:44 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "45271",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/45271/"
},
{
"name": "20180821 RESPONSIVE filemanager",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2018/Aug/34"
}
]
}
}