HTTP: Parameter Directory Traversal
This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.
Extended Description
MidiCMS Website Builder is prone to a local file-include vulnerability and an arbitrary-file-upload vulnerability. An attacker can exploit these issues to upload arbitrary files onto the webserver, execute arbitrary local files within the context of the webserver, and obtain sensitive information. MidiCMS Website Builder 2011 is vulnerable; other versions may also be affected.
Affected Products
Midicms_software midicms_website_builder
References
BugTraq: 52532 101789 39114 44852 68544 68361 69494 58385 9971 20160204 74792 74395 47970 68632 9966 71404 101527 66973 68540
CVE: CVE-2021-37343
URL: http://seclists.org/fulldisclosure/2014/Sep/110 http://seclists.org/fulldisclosure/2015/Jun/8 https://github.com/rapid7/metasploit-framework/pull/6038 http://tucanalamigo.blogspot.com/2010/04/pdc-de-zdi-10-078.html http://www.novell.com/support/kb/doc.php?id=7005573 http://seclists.org/fulldisclosure/2014/Aug/88 http://karmainsecurity.com/KIS-2016-07 http://www.sugarcrm.com/security/sugarcrm-sa-2016-001 http://www.sugarcrm.com/security/sugarcrm-sa-2016-008 https://bugs.php.net/bug.php?id=72663 http://secunia.com/advisories/50832 https://www.phpmyadmin.net/security/pmasa-2018-4/ https://medium.com/@happyholic1203/phpmyadmin-4-8-0-4-8-1-remote-code-execution-257bcc146f8e http://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html http://www.novell.com/support/viewcontent.do?externalid=7005573 http://blog.harmonysecurity.com/2010/04/novell-zenworks-uploadservlet-remote.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Midicms_software
7.5
6.5
7.8
4.0
5.0
6.4
8.5
9.0
10.0
6.8
7.1
9.4
9.3
5.5
5.8
3.5
4.3