CVE-2012-1617

Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a .. (dot dot) in the type parameter. NOTE: this vulnerability can be leveraged to upload arbitrary files.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html Exploit
http://osclass.org/2012/03/05/osclass-2-3-6/ Exploit Patch
http://secunia.com/advisories/48284 Vendor Advisory
http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability Exploit
http://www.openwall.com/lists/oss-security/2012/04/02/1
http://www.openwall.com/lists/oss-security/2012/04/02/6
http://www.openwall.com/lists/oss-security/2012/04/03/1 Exploit
http://www.openwall.com/lists/oss-security/2012/04/04/7 Exploit Patch
http://www.securityfocus.com/bid/52336 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b Exploit Patch
https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a Exploit Patch
https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 Exploit Patch
http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html Exploit
http://osclass.org/2012/03/05/osclass-2-3-6/ Exploit Patch
http://secunia.com/advisories/48284 Vendor Advisory
http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability Exploit
http://www.openwall.com/lists/oss-security/2012/04/02/1
http://www.openwall.com/lists/oss-security/2012/04/02/6
http://www.openwall.com/lists/oss-security/2012/04/03/1 Exploit
http://www.openwall.com/lists/oss-security/2012/04/04/7 Exploit Patch
http://www.securityfocus.com/bid/52336 Exploit
https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b Exploit Patch
https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a Exploit Patch
https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:juan_ramon:osclass:*:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.1:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:1.2:delta:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0:rc:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:juan_ramon:osclass:2.3.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-09-26 00:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-1617

Mitre link : CVE-2012-1617

CVE.ORG link : CVE-2012-1617


JSON object : View

Products Affected

juan_ramon

  • osclass
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')