Tag
#php
### Summary An unsanitized attachment filename allows any unauthenticated user to leverage a directory traversal vulnerability which results in a remote code execution vulnerability. ### Details An attacker can send an email with a malicious attachment to the inbox, which gets crawled with webklex/php-imap or webklex/laravel-imap. Prerequisite for the vulnerability is that the script stores the attachments without providing a `$filename`, or providing an unsanitized `$filename`, in `src/Attachment::save(string $path, string $filename = null)` (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L251-L255). In this case, where no `$filename` gets passed into the `Attachment::save()` method, the package would use a series of unsanitized and insecure input values from the mail as fallback (https://github.com/Webklex/php-imap/blob/5.2.0/src/Attachment.php#L252). Even if a developer passes a `$filename` into the `Attachment::save()` method, e.g. by passing the name or filenam...
User Registration & Login and User Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/search-result.php.
PHP Online School version 1.0 suffers from a cross site scripting vulnerability.
PHP Mail version 5.0 suffers from a cross site scripting vulnerability.
WordPress Super Socializer plugin version 7.13.52 suffers from a cross site scripting vulnerability.
Accent Microcomputers CMS version 2.4 suffers from a directory traversal vulnerability.
PHP Car Dealer version 3.0 suffers from a cross site scripting vulnerability.
WordPress WP Sticky Social plugin version 1.0.1 suffers from cross site request forgery and cross site scripting vulnerabilities.
3CX Open Standards Software IP PBX Thailand version 2.0.3 suffers from a cross site scripting vulnerability.
SPIP versions 4.2.1 and below suffer from an unauthenticated remote code execution vulnerability.