| Title | elunez eladmin <=v2.7 Path Traversal: 'dir/../../filename' |
|---|
| Description | Eladmin v2.7 has an arbitrary file upload vulnerability in the Database management and Deployment management.
Attackers can construct filenames like ../../file to upload arbitrary files to arbitrary directories or delete arbitrary files in arbitrary directories.
Details can be seen in: https://github.com/elunez/eladmin/issues/851 |
|---|
| Source | ⚠️ https://github.com/elunez/eladmin/issues/851 |
|---|
| User | nerowander (UID 72513) |
|---|
| Submission | 07/26/2024 09:32 (2 years ago) |
|---|
| Moderation | 08/04/2024 08:10 (9 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 273551 [elunez eladmin up to 2.7 Database Management/Deployment Management upload File path traversal] |
|---|
| Points | 18 |
|---|