Vulnerability Description
Directory traversal vulnerability in oc-includes/osclass/controller/ajax.php in OSClass before 3.4.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ajaxfile parameter in a custom action.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Osclass | Osclass | <= 3.4.2 |
Related Weaknesses (CWE)
References
- http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/PatchVendor Advisory
- http://karmainsecurity.com/KIS-2014-15
- http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.h
- http://seclists.org/fulldisclosure/2014/Dec/133
- http://www.securityfocus.com/archive/1/534360/100/0/threaded
- http://www.securityfocus.com/bid/71841
- http://blog.osclass.org/2014/10/09/osclass-3-4-3-ready-download/PatchVendor Advisory
- http://karmainsecurity.com/KIS-2014-15
- http://packetstormsecurity.com/files/129776/Osclass-3.4.2-Local-File-Inclusion.h
- http://seclists.org/fulldisclosure/2014/Dec/133
- http://www.securityfocus.com/archive/1/534360/100/0/threaded
- http://www.securityfocus.com/bid/71841
FAQ
What is CVE-2014-8084?
CVE-2014-8084 is a vulnerability with a CVSS score of 7.5 (HIGH). Directory traversal vulnerability in oc-includes/osclass/controller/ajax.php in OSClass before 3.4.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ajax...
How severe is CVE-2014-8084?
CVE-2014-8084 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8084?
Check the references section above for vendor advisories and patch information. Affected products include: Osclass Osclass.