Vulnerability Description
app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, instead of URL encoding, is very rare in a directory traversal attack vector).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sdcms | Sdcms | 1.6 |
Related Weaknesses (CWE)
References
- https://blog.whiterabbitxyj.com/cve/SDCMS_1.6_directory_traversal.docExploitThird Party Advisory
- https://github.com/WhiteRabbitc/WhiteRabbitc.github.io/blob/master/cve/SDCMS_1.6ExploitThird Party Advisory
- https://blog.whiterabbitxyj.com/cve/SDCMS_1.6_directory_traversal.docExploitThird Party Advisory
- https://github.com/WhiteRabbitc/WhiteRabbitc.github.io/blob/master/cve/SDCMS_1.6ExploitThird Party Advisory
FAQ
What is CVE-2018-19748?
CVE-2018-19748 is a vulnerability with a CVSS score of 7.5 (HIGH). app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter mu...
How severe is CVE-2018-19748?
CVE-2018-19748 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19748?
Check the references section above for vendor advisories and patch information. Affected products include: Sdcms Sdcms.