doorGets 7.0 allows remote attackers to write to arbitrary files via directory traversal, as demonstrated by a dg-user/?controller=theme&action=edit&name=doorgets&file=../../1.txt%00 URI with content in the theme_content_nofi parameter.
References
Link Resource
https://github.com/doorgets/CMS/issues/12 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-12-11T20:00:00

Updated: 2018-12-11T20:57:01

Reserved: 2018-12-11T00:00:00


Link: CVE-2018-20064

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-12-11T20:29:00.287

Modified: 2018-12-31T18:36:32.117


Link: CVE-2018-20064

JSON object: View

cve-icon Redhat Information

No data.

CWE