Vulnerability Description
The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&target=l1_../configuration.php&download=1 request. The specific pathname ../configuration.php should be base64 encoded for a valid attack. NOTE: the vendor disputes this issue because only files under the media-manager path can be downloaded, and the documentation indicates that sensitive information does not belong there. Nonetheless, 2.8.1 has additional blocking of .php downloads
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomlaworks | K2 | 2.8.0 |
Related Weaknesses (CWE)
References
- https://exploit-db.com/exploits/44188Broken Link
- https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-Vendor Advisory
- https://exploit-db.com/exploits/44188Broken Link
- https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-Vendor Advisory
FAQ
What is CVE-2018-7482?
CVE-2018-7482 is a vulnerability with a CVSS score of 7.5 (HIGH). The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&targ...
How severe is CVE-2018-7482?
CVE-2018-7482 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7482?
Check the references section above for vendor advisories and patch information. Affected products include: Joomlaworks K2.