CVE-2012-1617
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
26/09/2012
Last modified:
11/04/2025
Description
Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a .. (dot dot) in the type parameter. NOTE: this vulnerability can be leveraged to upload arbitrary files.
Impact
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:juan_ramon:osclass:*:*:*:*:*:*:*:* | 2.3.5 (including) | |
| cpe:2.3:a:juan_ramon:osclass:1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:1.1:rc:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:1.2:alpha:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:1.2:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:1.2:delta:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.0:rc:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:juan_ramon:osclass:2.2.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html
- http://osclass.org/2012/03/05/osclass-2-3-6/
- http://secunia.com/advisories/48284
- http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability
- http://www.openwall.com/lists/oss-security/2012/04/02/1
- http://www.openwall.com/lists/oss-security/2012/04/02/6
- http://www.openwall.com/lists/oss-security/2012/04/03/1
- http://www.openwall.com/lists/oss-security/2012/04/04/7
- http://www.securityfocus.com/bid/52336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
- https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b
- https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a
- https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1
- http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html
- http://osclass.org/2012/03/05/osclass-2-3-6/
- http://secunia.com/advisories/48284
- http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability
- http://www.openwall.com/lists/oss-security/2012/04/02/1
- http://www.openwall.com/lists/oss-security/2012/04/02/6
- http://www.openwall.com/lists/oss-security/2012/04/03/1
- http://www.openwall.com/lists/oss-security/2012/04/04/7
- http://www.securityfocus.com/bid/52336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73754
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73755
- https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b
- https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a
- https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1



