Directory Traversal vuln in Textpattern CMS v4.8.8 allows remote authenticated attacker to execute arbitrary code and gain access to sensitive information via plugin Upload function. NV
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | Directory traversal | 7 Aug 202314:15 | – | prion |
![]() | CVE-2023-36220 | 7 Aug 202314:15 | – | osv |
![]() | CVE-2023-36220 | 7 Aug 202300:00 | – | cvelist |
![]() | CVE-2023-36220 | 7 Aug 202300:00 | – | vulnrichment |
![]() | CVE-2023-36220 | 7 Aug 202314:15 | – | nvd |
Source | Link |
---|---|
textpattern | www.textpattern.com/ |
packetstormsecurity | www.packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html |
textpattern | www.textpattern.com/file_download/118/textpattern-4.8.8.zip |
release-demo | www.release-demo.textpattern.co/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo