Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2019-11378First vendor Publication2019-04-20
VendorCveLast vendor Modification2019-05-10

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score6.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score8AuthenticationRequires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11378

CWE : Common Weakness Enumeration

%idName
100 %CWE-434Unrestricted Upload of File with Dangerous Type (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/108069
MISC https://github.com/projectsend/projectsend/issues/700

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-05-10 21:19:20
  • Multiple Updates
2019-04-26 13:19:10
  • Multiple Updates
2019-04-22 21:19:18
  • Multiple Updates
2019-04-20 21:19:29
  • First insertion