First published: Sun Apr 08 2018(Updated: )
In Gxlcms QY v1.0.0713, Lib\Lib\Action\Admin\TplAction.class.php allows remote attackers to read any file via a modified pathname in an Admin-Tpl request, as demonstrated by use of '|' instead of '/' as a directory separator, in conjunction with a ".." sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gxlcms | =1.0.0713 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9851 is a vulnerability in Gxlcms QY v1.0.0713 that allows remote attackers to read any file via a modified pathname in an Admin-Tpl request.
The vulnerability in Gxlcms QY v1.0.0713 occurs due to the use of '|' instead of '/' as a directory separator, in conjunction with a ".." sequence, allowing attackers to read files they shouldn't have access to.
CVE-2018-9851 has a severity rating of 7.5 (high).
Gxlcms QY v1.0.0713 is the affected version of the software.
To fix CVE-2018-9851, update Gxlcms QY to a version that addresses the vulnerability.