7.5
HIGH

CVE-2012-2227

Published: 26/08/2012 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10

Vulnerability Summary

Directory traversal vulnerability in update/index.php in PluXml prior to 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Complexity: LOW
Authentication: NONE
Access Vector: NETWORK
Confidentiality Impact: PARTIAL
Integrity Impact: PARTIAL
Availability Impact: PARTIAL

Affected Products

Vendor Product Versions
PluxmlPluxml5.1.5

Exploits

Advisory ID: HTB23086 Product: PluXml Vendor: pluxmlorg Vulnerable Version(s): 515 and probably prior Tested Version: 515 Vendor Notification: 11 April 2012 Vendor Patch: 16 April 2012 Public Disclosure: 2 May 2012 Vulnerability Type: Local File Inclusion CVE Reference(s): CVE-2012-2227 Solution Status: Fixed by Vendor Risk Level: High Cre ...

Mailing Lists

PluXml version 515 suffers from a local file inclusion vulnerability ...

References