Prior to version 5.3.0, an unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability, which results in a remote code execution vulnerability. PHP-IMAP is a wrapper for common IMAP communication without the need to have the php-imap module installed / enabled. Editions other than Enterprise are also affected. Regular user privileges can be used to exploit this vulnerability. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. An Unrestricted File Upload vulnerability has been identified in the Notes module. In CloudPanel before 2.3.1, insecure file upload leads to privilege escalation and authentication bypass.įunadmin v3.3.2 and v3.3.3 are vulnerable to Insecure file upload via the plugins install.Īn issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |