First published: Tue Dec 30 2014(Updated: )
Directory traversal vulnerability in install/popup.php in Exponent CMS before 2.2.0 RC1 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Exponentcms Exponent Cms | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3295 is considered a critical vulnerability because it allows remote attackers to execute arbitrary code on the affected system.
To fix CVE-2013-3295, upgrade Exponent CMS to version 2.2.0 RC1 or later.
CVE-2013-3295 exploits a directory traversal vulnerability that allows attackers to include and execute arbitrary local files.
CVE-2013-3295 affects Exponent CMS versions prior to 2.2.0 RC1.
The 'page' parameter in install/popup.php is vulnerable in CVE-2013-3295.