漏洞标题
WeGIA中exportar_dump.php的file参数存在路径遍历漏洞
漏洞描述信息
WeGIA是一款开源的Web管理系统,主要面向葡萄牙语用户。在WeGIA应用的`exportar_dump.php`端点中发现了一个路径遍历漏洞。此漏洞可能会允许攻击者未经授权访问存储在`config.php`中的敏感信息。`config.php`包含的信息可允许直接访问数据库。此问题已在版本3.2.14中得到解决,建议所有用户进行升级。目前尚无针对此漏洞的解决方法。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
对路径名的限制不恰当(路径遍历)
漏洞标题
Path Traversal endpoint 'exportar_dump.php' parameter 'file' in WeGIA
漏洞描述信息
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Path Traversal vulnerability was discovered in the WeGIA application, `exportar_dump.php` endpoint. This vulnerability could allow an attacker to gain unauthorized access to sensitive information stored in `config.php`. `config.php` contains information that could allow direct access to the database. This issue has been addressed in version 3.2.14 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS信息
N/A
漏洞类别
对路径名的限制不恰当(路径遍历)