First published: Thu Nov 14 2013(Updated: )
Directory traversal vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to read or delete arbitrary files via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ajaxplorer | <=5.0.3 | |
Ajaxplorer | =2.3.3 | |
Ajaxplorer | =2.3.4 | |
Ajaxplorer | =2.5 | |
Ajaxplorer | =2.5.4 | |
Ajaxplorer | =2.5.5 | |
Ajaxplorer | =2.6.0 | |
Ajaxplorer | =2.7.1 | |
Ajaxplorer | =2.7.2 | |
Ajaxplorer | =2.7.3 | |
Ajaxplorer | =3.0 | |
Ajaxplorer | =3.0.1 | |
Ajaxplorer | =3.0.2 | |
Ajaxplorer | =3.0.3 | |
Ajaxplorer | =3.1 | |
Ajaxplorer | =3.1.1 | |
Ajaxplorer | =3.2 | |
Ajaxplorer | =3.2.1 | |
Ajaxplorer | =3.2.2 | |
Ajaxplorer | =3.2.3 | |
Ajaxplorer | =3.2.4 | |
Ajaxplorer | =3.2.5 | |
Ajaxplorer | =3.3.2 | |
Ajaxplorer | =3.3.3 | |
Ajaxplorer | =3.3.4 | |
Ajaxplorer | =3.3.5 | |
Ajaxplorer | =4.0 | |
Ajaxplorer | =4.0.1 | |
Ajaxplorer | =4.0.2 | |
Ajaxplorer | =4.0.3 | |
Ajaxplorer | =4.0.4 | |
Ajaxplorer | =4.2.0 | |
Ajaxplorer | =4.2.2 | |
Ajaxplorer | =4.2.3 | |
Ajaxplorer | =5.0.0 | |
Ajaxplorer | =5.0.1 | |
Ajaxplorer | =5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6226 is rated as a moderate severity directory traversal vulnerability affecting multiple versions of the Ajaxplorer software.
To fix CVE-2013-6226, upgrade to Ajaxplorer version 5.0.4 or later, which includes a patch for this vulnerability.
Attackers can exploit CVE-2013-6226 to read or delete arbitrary files on the server due to insufficient input validation.
CVE-2013-6226 affects all versions of Ajaxplorer prior to 5.0.4, including versions 2.3.3 to 5.0.3.
Yes, CVE-2013-6226 is a remote vulnerability, allowing attackers to exploit it without physical access to the affected system.