First published: Wed May 14 2014(Updated: )
Multiple directory traversal vulnerabilities in OpenX before 2.8.10 revision 82710 allow remote administrators to read arbitrary files via a .. (dot dot) in the group parameter to (1) plugin-preferences.php or (2) plugin-settings.php in www/admin, a different vulnerability than CVE-2013-7376. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to read arbitrary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openx Openx | <=2.8.10 | |
Openx Openx | =2.4 | |
Openx Openx | =2.4.4 | |
Openx Openx | =2.4.5 | |
Openx Openx | =2.4.6 | |
Openx Openx | =2.4.7 | |
Openx Openx | =2.4.8 | |
Openx Openx | =2.4.9 | |
Openx Openx | =2.4.10 | |
Openx Openx | =2.4.11 | |
Openx Openx | =2.6.0 | |
Openx Openx | =2.6.1 | |
Openx Openx | =2.6.2 | |
Openx Openx | =2.6.3 | |
Openx Openx | =2.6.4 | |
Openx Openx | =2.6.5 | |
Openx Openx | =2.7.29 | |
Openx Openx | =2.8 | |
Openx Openx | =2.8.1 | |
Openx Openx | =2.8.2 | |
Openx Openx | =2.8.3 | |
Openx Openx | =2.8.4 | |
Openx Openx | =2.8.5 | |
Openx Openx | =2.8.6 | |
Openx Openx | =2.8.7 | |
Openx Openx | =2.8.8 | |
Openx Openx | =2.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.