CVE-2017-14979

Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
References
Link Resource
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gxlcms:gxlcms:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-10-03 01:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-14979

Mitre link : CVE-2017-14979

CVE.ORG link : CVE-2017-14979


JSON object : View

Products Affected

gxlcms

  • gxlcms