First published: Mon Oct 29 2018(Updated: )
ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectsend Projectsend | =582 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10733 is a vulnerability in ProjectSend (formerly cFTP) r582 that allows directory traversal via a query string parameter.
CVE-2016-10733 allows an attacker to perform directory traversal attacks, potentially accessing files outside of the intended directory structure.
The severity of CVE-2016-10733 is critical, with a CVSS score of 9.8.
To fix CVE-2016-10733, it is recommended to upgrade to a patched version of ProjectSend.
Yes, you can find more details about CVE-2016-10733 in the reference link provided: https://github.com/sandboxescape/ProjectSend-multiple-vulnerabilities/