Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/701572 | US Government Resource |
https://community.rapid7.com/community/metasploit/blog/2013/05/15/new-1day-exploits-mutiny-vulnerabilities | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2022-10-03T16:15:04
Updated: 2022-10-03T16:15:04
Reserved: 2022-10-03T00:00:00
Link: CVE-2013-0136
JSON object: View
NVD Information
Status : Analyzed
Published: 2013-06-01T14:21:05.813
Modified: 2013-06-03T04:00:00.000
Link: CVE-2013-0136
JSON object: View
Redhat Information
No data.
CWE