Vulnerability Description
Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chadhaajay | Phpkb | 9.0 |
Related Weaknesses (CWE)
References
- http://antoniocannito.it/?p=137#afdExploitThird Party Advisory
- http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-AuthenticatedThird Party AdvisoryVDB Entry
- https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/48220Third Party AdvisoryVDB Entry
- http://antoniocannito.it/?p=137#afdExploitThird Party Advisory
- http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-AuthenticatedThird Party AdvisoryVDB Entry
- https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/48220Third Party AdvisoryVDB Entry
FAQ
What is CVE-2020-10387?
CVE-2020-10387 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file...
How severe is CVE-2020-10387?
CVE-2020-10387 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-10387?
Check the references section above for vendor advisories and patch information. Affected products include: Chadhaajay Phpkb.