CVE-2022-45475
https://notcve.org/view.php?id=CVE-2022-45475
Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to access the application's internal files. This is possible because the application is vulnerable to broken access control. La versión 2.4.8 de Tiny File Manager permite que un atacante remoto no autenticado acceda a los archivos internos de la aplicación. Esto es posible porque la aplicación es vulnerable a un control de acceso roto. • https://fluidattacks.com/advisories/mosey https://github.com/prasathmani/tinyfilemanager •
CVE-2022-1000 – Path Traversal in prasathmani/tinyfilemanager
https://notcve.org/view.php?id=CVE-2022-1000
Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7. Un Salto de Ruta en el repositorio de GitHub prasathmani/tinyfilemanager versiones anteriores a 2.4.7 • https://github.com/prasathmani/tinyfilemanager/commit/154947ef83efeb68fc2b921065392b6a7fc9c965 https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-45010 – Tiny File Manager 2.4.6 - Remote Code Execution (RCE)
https://notcve.org/view.php?id=CVE-2021-45010
A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution. Una vulnerabilidad de cruce de rutas en la funcionalidad de carga de archivos en tinyfilemanager.php en Tiny File Manager antes de la versión 2.4.7 permite a los atacantes remotos (con cuentas de usuario válidas) cargar archivos PHP maliciosos en la raíz web, lo que lleva a la ejecución de código Tiny File Manager version 2.4.6 suffers from an authenticated remote shell upload vulnerability. • https://www.exploit-db.com/exploits/50828 https://github.com/BKreisel/CVE-2021-45010 https://github.com/Syd-SydneyJr/CVE-2021-45010 https://github.com/febinrev/CVE-2021-45010-TinyFileManager-Exploit http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html https://febin0x4e4a.wordpress.com/2022/01/23/tiny-file-manager-authenticated-rce https://github.com/febinrev/tinyfilemanager-2.4.3-exploit/raw/main/exploit.sh https://github.com/prasathmani/tinyfilemanager/commit • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-36246
https://notcve.org/view.php?id=CVE-2020-36246
Amaze File Manager before 3.5.1 allows attackers to obtain root privileges via shell metacharacters in a symbolic link. Amaze File Manager versiones anteriores a 3.5.1, permite a atacantes alcanzar privilegios de root por medio de metacaracteres de shell en un enlace simbólico • https://compass-security.com/fileadmin/Research/Advisories/2020-18_CSNC-2020-030_Amaze_FileManager_Privilege_Escalation.txt https://github.com/TeamAmaze/AmazeFileManager/releases/tag/v3.5.1 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-22550
https://notcve.org/view.php?id=CVE-2020-22550
Veno File Manager 3.5.6 is affected by a directory traversal vulnerability. Using the traversal allows an attacker to download sensitive files from the server. Veno File Manager versiones 3.5.6, está afectado por una vulnerabilidad de salto de directorios. El uso del salto permite a un atacante descargar archivos confidenciales desde el servidor. • https://codecanyon.net/item/veno-file-manager-host-and-share-files/6114247 https://gist.github.com/Sp3eD-X/22640377f96340544baf12891f708b8f • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •