A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.
References
Link | Resource |
---|---|
https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20read%20vulenrability%20via%20the%20filename.md | Exploit |
https://vuldb.com/?ctiid.231512 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.231512 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-06-14 09:15
Updated : 2024-05-17 02:27
NVD link : CVE-2023-3241
Mitre link : CVE-2023-3241
CVE.ORG link : CVE-2023-3241
JSON object : View
Products Affected
otcms
- otcms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')