CVE-2018-7482

The K2 component 2.8.0 for Joomla! has Incorrect Access Control with directory traversal, allowing an attacker to download arbitrary files, as demonstrated by a view=media&task=connector&cmd=file&target=l1_../configuration.php&download=1 request. The specific pathname ../configuration.php should be base64 encoded for a valid attack. NOTE: the vendor disputes this issue because only files under the media-manager path can be downloaded, and the documentation indicates that sensitive information does not belong there. Nonetheless, 2.8.1 has additional blocking of .php downloads
Configurations

Configuration 1 (hide)

cpe:2.3:a:joomlaworks:k2:2.8.0:*:*:*:*:joomla\!:*:*

History

21 Nov 2024, 04:12

Type Values Removed Values Added
References () https://exploit-db.com/exploits/44188 - Broken Link () https://exploit-db.com/exploits/44188 - Broken Link
References () https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-report-on-k2-v2-8-0 - Vendor Advisory () https://www.joomlaworks.net/forum/forum-updates-other-resources/49046-false-cve-report-on-k2-v2-8-0 - Vendor Advisory

Information

Published : 2018-02-28 07:29

Updated : 2024-11-21 04:12


NVD link : CVE-2018-7482

Mitre link : CVE-2018-7482

CVE.ORG link : CVE-2018-7482


JSON object : View

Products Affected

joomlaworks

  • k2
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')