Overview
- Description
- Directory traversal vulnerability in index.php in plx Web Studio (aka plxWebDev) plx Pay 3.2 and earlier allows remote attackers to include and execute arbitrary local files, or obtain user credentials and other sensitive information, via a .. (dot dot) in the read parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:plx_web_studio:plx_pay:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "692E02C2-3A87-44F9-A8E6-01C948A0DD10", "versionEndIncluding": "3.2" }, { "criteria": "cpe:2.3:a:plx_web_studio:plx_pay:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85BF9492-19D6-4ACE-8458-A5CBB1EEC0CF" } ], "operator": "OR" } ] } ]