1 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Ragnarok Online Control Panel 4.3.4a, when the Apache HTTP Server is used, allows remote attackers to bypass authentication via directory traversal sequences in a URI that ends with the name of a publicly available page, as demonstrated by a "/...../" sequence and an account_manage.php/login.php final component for reaching the protected account_manage.php page. Vulnerabilidad de salto de directorio en Ragnarok Online Control Panel 4.3.4a, cuando se utiliza Apache HTTP Server, permite a atacantes remotos evitar la autenticación mediante secuencias de salto de directorio en un URI que termina con el nombre de una página públicamente disponible, como ha sido demostrado por la secuencia "/...../" y un componente final account_manage.php/login.php para acceder a la página protegida account_manage.php. • http://osvdb.org/45879 http://securityreason.com/securityalert/3100 http://www.securityfocus.com/archive/1/478263/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •