Vulnerability Description
www/getfile.php in WPO WebPageTest 19.04 on Windows allows Directory Traversal (for reading arbitrary files) because of an unanchored regular expression, as demonstrated by the a.jpg\.. substring.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webpagetest | Webpagetest | 19.04 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://github.com/WPO-Foundation/webpagetest/pull/1299ExploitPatchThird Party Advisory
- https://github.com/WPO-Foundation/webpagetest/pull/1299ExploitPatchThird Party Advisory
FAQ
What is CVE-2019-17199?
CVE-2019-17199 is a vulnerability with a CVSS score of 7.5 (HIGH). www/getfile.php in WPO WebPageTest 19.04 on Windows allows Directory Traversal (for reading arbitrary files) because of an unanchored regular expression, as demonstrated by the a.jpg\.. substring.
How severe is CVE-2019-17199?
CVE-2019-17199 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-17199?
Check the references section above for vendor advisories and patch information. Affected products include: Webpagetest Webpagetest, Microsoft Windows.