ezContents是一款开放源代码内容管理系统。 ezContents 存在多个目录遍历漏洞。远程攻击者可以借助(1)modules/diary/showdiary.php的 gsLanguage和language_home 参数; (2) modules/diary/showdiarydetail.php的admin_home、gsLanguage、language_home参数; (3) modules/diary/submit_diary.php的gsLanguage 和language_home 参数; (4) modules/news/news_summary.php的admin_home参数; (5) modules/news/inlinenews.php的nLink、gsLanguage、language_home参数;(5)modules/中脚本diary/showeventlist.php、gallery/showgallery.php、 guestbook/submit_guestbook.php、reviews/submit_reviews.php、news/submit_news.php、diary/inlineeventlist.php和news/archivednews_summary.php的未明向量包含本地任意文件导致执行任意代码。该漏洞和modules/moduleSec.php中缺乏目录遍历保护策略。
ezContents是一款开放源代码内容管理系统。 ezContents 存在多个目录遍历漏洞。远程攻击者可以借助(1)modules/diary/showdiary.php的 gsLanguage和language_home 参数; (2) modules/diary/showdiarydetail.php的admin_home、gsLanguage、language_home参数; (3) modules/diary/submit_diary.php的gsLanguage 和language_home 参数; (4) modules/news/news_summary.php的admin_home参数; (5) modules/news/inlinenews.php的nLink、gsLanguage、language_home参数;(5)modules/中脚本diary/showeventlist.php、gallery/showgallery.php、 guestbook/submit_guestbook.php、reviews/submit_reviews.php、news/submit_news.php、diary/inlineeventlist.php和news/archivednews_summary.php的未明向量包含本地任意文件导致执行任意代码。该漏洞和modules/moduleSec.php中缺乏目录遍历保护策略。