Vulnerability Description
Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Related Weaknesses (CWE)
References
- https://github.com/nirix/traq/releases/tag/v2.3.1
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://web.archive.org/web/20110729003039/https://traqproject.org/
- https://www.exploit-db.com/exploits/18213
- https://www.exploit-db.com/exploits/18239
- https://www.vulncheck.com/advisories/traq-issue-tracking-system-rce
FAQ
What is CVE-2011-10013?
CVE-2011-10013 is a documented vulnerability. Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowi...
How severe is CVE-2011-10013?
CVSS scoring is not yet available for CVE-2011-10013. Check NVD for updates.
Is there a patch for CVE-2011-10013?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.