First published: Mon Jan 23 2017(Updated: )
The patch for directory traversal (CVE-2017-5480) in b2evolution version 6.8.4-stable has a bypass vulnerability. An attacker can use ..\/ to bypass the filter rule. Then, this attacker can exploit this vulnerability to delete or read any files on the server. It can also be used to determine whether a file exists.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Evolution | =6.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5539 has a high severity rating due to the potential for file deletion and unauthorized file access.
To fix CVE-2017-5539, upgrade b2evolution to version 6.8.5 or later.
CVE-2017-5539 can be exploited for directory traversal attacks enabling unauthorized file reading or deletion.
CVE-2017-5539 is related to CVE-2017-5480, which addressed directory traversal but was bypassed.
CVE-2017-5539 affects b2evolution version 6.8.4.