In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
https://aetsu.github.io/OpenCms | Exploit Third Party Advisory |
https://github.com/alkacon/opencms-core/commits/branch_10_5_x | Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-08-27T11:11:06
Updated: 2019-09-02T18:06:05
Reserved: 2019-07-04T00:00:00
Link: CVE-2019-13237
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-08-27T12:15:12.593
Modified: 2022-04-18T16:11:33.903
Link: CVE-2019-13237
JSON object: View
Redhat Information
No data.
CWE