First published: Thu Nov 15 2018(Updated: )
Directory traversal vulnerability in FileZen V3.0.0 to V4.2.1 allows remote attackers to upload an arbitrary file in the specific directory in FileZen via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Soliton Filezen | >=3.0.0<=4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0693 is high with a CVSS score of 7.5.
FileZen versions between 3.0.0 and 4.2.1 are affected by CVE-2018-0693.
The directory traversal vulnerability in FileZen allows remote attackers to upload an arbitrary file in a specific directory via unspecified vectors.
To fix CVE-2018-0693, update FileZen to a version that is greater than or equal to 4.2.1.
More information about CVE-2018-0693 can be found at the following references: [JVN advisory](http://jvn.jp/en/jp/JVN95355683/index.html) and [Soliton advisory](https://www.soliton.co.jp/support/2018/003328.html).