CVE-2018-18703
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
PhpTpoint Mailing Server Using File Handling 1.0 suffers from multiple Arbitrary File Read vulnerabilities in different sections that allow an attacker to read sensitive files on the system via directory traversal, bypassing the login page, as demonstrated by the Mailserver_filesystem/home.php coninb, consent, contrsh, condrft, or conspam parameter.
PhpTpoint Mailing Server Using File Handling 1.0 sufre de múltiples vulnerabilidades de lectura de archivos arbitrarios en diferentes secciones que permiten que un atacante lea archivos sensibles en el sistema mediante un salto de directorio, omitiendo la página de inicio de sesión. Esto queda demostrado por los parámetros coninb, consent, contrsh, condrft o conspam en Mailserver_filesystem/home.php.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-10-27 CVE Reserved
- 2018-10-27 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2024-10-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://packetstormsecurity.com/files/149965/PHPTPoint-Mailing-Server-Using-File-Handling-1.0-Arbitrary-File-Read.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phptpoint Search vendor "Phptpoint" | Mailing Server Using File Handling Search vendor "Phptpoint" for product "Mailing Server Using File Handling" | 1.0 Search vendor "Phptpoint" for product "Mailing Server Using File Handling" and version "1.0" | - |
Affected
|