提交 #772855: CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php信息

标题CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php
描述CMS Made Simple (CMSMS) version 2.2.22 and earlier contains a path traversal vulnerability in the UserGuide module's XML import functionality. The _copyFilesToFolder() function in modules/UserGuide/lib/class.UserGuideImporterExporter.php fails to properly sanitize user-supplied filenames and directory paths from imported XML files. An authenticated administrator can exploit this vulnerability by uploading a specially crafted XML file containing path traversal sequences (../) and base64-encoded malicious code, allowing arbitrary file uploads to any location on the server file system. This can lead to remote code execution, complete server compromise, data theft, and denial of service. The vulnerability affects the default installation with no additional configuration required. CVSS v3.1 Base Score: 7.2 (HIGH) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CWE-22: Improper Limitation of a Pathname to a Restricted Directory CWE-434: Unrestricted Upload of File with Dangerous Type
来源⚠️ https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa
用户
 caginkyr (UID 96143)
提交2026-03-05 13時03分 (1 月前)
管理2026-03-31 10時40分 (26 days later)
状态已接受
VulDB条目354331 [CMS Made Simple 直到 2.2.22 UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder 目录遍历]
积分20

Might our Artificial Intelligence support you?

Check our Alexa App!