- Description
- Directory traversal vulnerability in Advanced Poll 2.0.2 allows remote attackers to read arbitrary files or inject arbitrary local PHP files via .. sequences in the base_path or pollvars[lang] parameters to the admin files (1) index.php, (2) admin_tpl_new.php, (3) admin_tpl_misc_new.php, (4) admin_templates_misc.php, (5) admin_templates.php, (6) admin_stats.php, (7) admin_settings.php, (8) admin_preview.php, (9) admin_password.php, (10) admin_logout.php, (11) admin_license.php, (12) admin_help.php, (13) admin_embed.php, (14) admin_edit.php, or (15) admin_comment.php.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:advanced_poll:advanced_poll:2.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "17657A69-6810-444B-9BC0-996CC82DEBC5"
},
{
"criteria": "cpe:2.3:a:advanced_poll:advanced_poll:2.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "23F5DC1B-8E27-4081-AD21-B88083D8A7F9"
},
{
"criteria": "cpe:2.3:a:advanced_poll:advanced_poll:2.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C0A1428F-87C3-4D20-A86E-EEBD68755E55"
}
],
"operator": "OR"
}
]
}
]