Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and previous versions allows remote malicious users to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
realnetworks realone player 1.0 |
||
realnetworks realone player 2.0 |
||
realnetworks realplayer 10.0 |
||
realnetworks realplayer 10.5_6.0.12.1016_beta |
||
realnetworks realplayer 10.5_6.0.12.1040 |
||
realnetworks realplayer 10.0_beta |
||
realnetworks realplayer 10.0_6.0.12.690 |
||
realnetworks realplayer 10.5 |