First published: Tue Oct 03 2017(Updated: )
Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Usualtool CMS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14979 is considered to be of high severity due to its potential for remote file access vulnerabilities.
To fix CVE-2017-14979, update Gxlcms to a version that properly validates and sanitizes user input for file paths.
CVE-2017-14979 affects all versions of Gxlcms prior to the security fix that addresses the vulnerability.
Yes, CVE-2017-14979 allows remote attackers to read arbitrary files, potentially exposing sensitive information.
The impact of CVE-2017-14979 on web applications includes the risk of unauthorized data exposure through file read attacks.