First published: Thu Mar 22 2012(Updated: )
Multiple directory traversal vulnerabilities in the Get Template feature in plugins/gui.ajax/class.AJXP_ClientDriver.php in AjaXplorer 3.2.x before 3.2.5 and 4.0.x before 4.0.4 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) pluginName or (2) pluginPath parameter in a get_template action. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ajaxplorer | =3.2 | |
Ajaxplorer | =3.2.1 | |
Ajaxplorer | =3.2.2 | |
Ajaxplorer | =3.2.3 | |
Ajaxplorer | =3.2.4 | |
Ajaxplorer | =4.0 | |
Ajaxplorer | =4.0.1 | |
Ajaxplorer | =4.0.2 | |
Ajaxplorer | =4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1839 is classified as a high severity vulnerability due to its directory traversal nature, allowing attackers to execute arbitrary files.
To fix CVE-2012-1839, update AjaXplorer to version 3.2.5 or 4.0.4 or later.
CVE-2012-1839 affects AjaXplorer versions 3.2.x before 3.2.5 and 4.0.x before 4.0.4.
CVE-2012-1839 allows remote attackers to perform directory traversal attacks to include and execute arbitrary local files.
While the best course of action is to update, restricting file permissions may help mitigate the risk associated with CVE-2012-1839.