Vulnerability Description
Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the selitems[] parameter in a download_selected action to index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Quixplorer | Quixplorer | <= 2.5.4 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/55725
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89059
- https://github.com/realtimeprojects/quixplorer
- https://github.com/realtimeprojects/quixplorer/blob/v2.5.5/doc/RELEASES.md
- https://github.com/realtimeprojects/quixplorer/commit/7ac119cebd3b6bfe16a30fd1d5Exploit
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txtExploit
- http://secunia.com/advisories/55725
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89059
- https://github.com/realtimeprojects/quixplorer
- https://github.com/realtimeprojects/quixplorer/blob/v2.5.5/doc/RELEASES.md
- https://github.com/realtimeprojects/quixplorer/commit/7ac119cebd3b6bfe16a30fd1d5Exploit
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txtExploit
FAQ
What is CVE-2013-1641?
CVE-2013-1641 is a vulnerability with a CVSS score of 7.8 (HIGH). Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the selitems[] parameter in a downl...
How severe is CVE-2013-1641?
CVE-2013-1641 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1641?
Check the references section above for vendor advisories and patch information. Affected products include: Quixplorer Quixplorer.