Vulnerability Description
The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to rename the .htaccess file that blocks .php uploads.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Precurio | Precurio | 2.1 |
Related Weaknesses (CWE)
References
- https://blog.ripstech.com/2016/precurio-remote-command-execution-via-xinha-plugiExploitThird Party Advisory
- https://demo.ripstech.com/projects/precurio_2.1Third Party Advisory
- https://blog.ripstech.com/2016/precurio-remote-command-execution-via-xinha-plugiExploitThird Party Advisory
- https://demo.ripstech.com/projects/precurio_2.1Third Party Advisory
FAQ
What is CVE-2016-10759?
CVE-2016-10759 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Xinha plugin in Precurio 2.1 allows Directory Traversal, with resultant arbitrary code execution, via ExtendedFileManager/Classes/ExtendedFileManager.php because ExtendedFileManager can be used to...
How severe is CVE-2016-10759?
CVE-2016-10759 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10759?
Check the references section above for vendor advisories and patch information. Affected products include: Precurio Precurio.