First published: Mon Aug 13 2012(Updated: )
Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mysqldumper | =1.24.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4253 is considered to have a moderate severity due to its potential for directory traversal attacks that can expose sensitive files.
To fix CVE-2012-4253, ensure that MySQLDumper is upgraded to a version later than 1.24.4 where these vulnerabilities are patched.
Exploiting CVE-2012-4253 can allow attackers to read arbitrary files on the server or execute local files, which can lead to data exposure or system compromise.
CVE-2012-4253 specifically affects MySQLDumper version 1.24.4.
Yes, CVE-2012-4253 can be exploited remotely, allowing attackers to access vulnerable functions through crafted requests.