Vulnerability Description
Directory traversal vulnerability in cm/newui/blog/export.jsp in eTouch SamePage Enterprise Edition 4.4.0.0.239 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filepath parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Etouch | Samepage | 4.4.0.0.239 |
Related Weaknesses (CWE)
References
- http://osvdb.org/show/osvdb/118357
- http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-InjeExploit
- http://seclists.org/fulldisclosure/2015/Feb/47Exploit
- http://www.exploit-db.com/exploits/36089Exploit
- http://www.securityfocus.com/bid/74887
- http://osvdb.org/show/osvdb/118357
- http://packetstormsecurity.com/files/130386/eTouch-Samepage-4.4.0.0.239-SQL-InjeExploit
- http://seclists.org/fulldisclosure/2015/Feb/47Exploit
- http://www.exploit-db.com/exploits/36089Exploit
- http://www.securityfocus.com/bid/74887
FAQ
What is CVE-2015-2071?
CVE-2015-2071 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Directory traversal vulnerability in cm/newui/blog/export.jsp in eTouch SamePage Enterprise Edition 4.4.0.0.239 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file...
How severe is CVE-2015-2071?
CVE-2015-2071 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2071?
Check the references section above for vendor advisories and patch information. Affected products include: Etouch Samepage.