First published: Wed Jun 24 2020(Updated: )
Bludit 3.12.0 allows admins to use a /plugin-backup-download?file=../ directory traversal approach for arbitrary file download via backup/plugin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bludit | =3.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15026 is a vulnerability that allows admins of Bludit 3.12.0 to perform directory traversal and download arbitrary files via the /plugin-backup-download?file=../ endpoint.
The severity of CVE-2020-15026 is medium with a CVSS score of 4.9.
CVE-2020-15026 affects Bludit 3.12.0 by enabling admins to perform directory traversal and download arbitrary files.
A hacker can exploit CVE-2020-15026 by manipulating the /plugin-backup-download?file=../ parameter to download sensitive files from the server.
Yes, the fix for CVE-2020-15026 is to upgrade to a version of Bludit that is not affected by the vulnerability.