First published: Thu Mar 12 2020(Updated: )
Path Traversal in admin/imagepaster/image-renaming.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameter imgName (for the new name) and imgUrl (for the current file to be renamed).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chadhaajay Phpkb | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-10457 is medium.
CVE-2020-10457 allows attackers to rename any file on the webserver using a dot-dot-slash sequence (../) via the POST parameters imgName and imgUrl.
Chadha PHPKB Standard Multi-Language 9.0 is affected by CVE-2020-10457.
An attacker can exploit CVE-2020-10457 by manipulating the POST parameters imgName and imgUrl to perform path traversal and rename any file on the webserver.
Yes, you can find more information about CVE-2020-10457 at the following references: [Reference 1](http://antoniocannito.it/?p=137#afr) and [Reference 2](https://antoniocannito.it/phpkb1#arbitrary-file-renaming-cve-2020-10457).