First published: Wed Dec 14 2011(Updated: )
Multiple directory traversal vulnerabilities in WHMCompleteSolution (WHMCS) 3.x and 4.x allow remote attackers to read arbitrary files via the templatefile parameter to (1) submitticket.php and (2) downloads.php, and (3) the report parameter to admin/reports.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WHMCS | =3.0.0 | |
WHMCS | =4.0.0 | |
WHMCS | =4.0.1 | |
WHMCS | =4.0.2 | |
WHMCS | =4.1.0 | |
WHMCS | =4.1.1 | |
WHMCS | =4.1.2 | |
WHMCS | =4.2.0 | |
WHMCS | =4.2.0-beta_r1 | |
WHMCS | =4.2.0-beta_r2 | |
WHMCS | =4.2.0-beta_r3 | |
WHMCS | =4.2.1 | |
WHMCS | =4.3.0 | |
WHMCS | =4.3.1 | |
WHMCS | =4.4.0 | |
WHMCS | =4.4.1 | |
WHMCS | =4.4.2 | |
WHMCS | =4.5.0 | |
WHMCS | =4.5.1 | |
WHMCS | =4.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4810 has a high severity level due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2011-4810, update WHMCompleteSolution to a version that is not vulnerable, preferably the latest release.
CVE-2011-4810 can enable attackers to perform directory traversal attacks to read arbitrary files on the server.
CVE-2011-4810 affects WHMCompleteSolution versions 3.x and 4.x, specifically 3.0.0 to 4.5.2.
CVE-2011-4810 allows exploitation through the templatefile parameter in submitticket.php and downloads.php, and the report parameter in admin/reports.php.