Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-02T17:00:00
Updated: 2024-08-05T19:42:22.358Z
Reserved: 2017-10-01T00:00:00
Link: CVE-2017-14979
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-10-03T01:29:02.733
Modified: 2024-11-21T03:13:53.300
Link: CVE-2017-14979
Redhat
No data.