Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2013-0136
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 8.5/10
- Exploit Score
- 6.8/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- Single
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:h:mutiny:mutiny_appliance:-:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutiny:mutiny_virtual_appliance:-:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutiny:mutiny:5.0-1.00:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:mutiny:mutiny:*:*:*:*:*:*:*:* |
Yes
|
- | - |