+33 (0)1 8695 8660

Vulnerability Details :

An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
Publish Date : 2019-04-20 Last Update Date : 2019-04-20

- CVSS Scores & Vulnerability Types

CVSS Score
0.0
Confidentiality Impact ???
Integrity Impact ???
Availability Impact ???
Access Complexity ???
Authentication ???
Gained Access None
Vulnerability Type(s) Directory traversal
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2019-11378

# Product Type Vendor Product Version Update Edition Language
No vulnerable product found. If the vulnerability is created recently it may take a few days to gather vulnerable products list and other information like cvss scores. Please check again in a few days.

- References For CVE-2019-11378

https://github.com/projectsend/projectsend/issues/700

- Metasploit Modules Related To CVE-2019-11378

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


Newsletter Cybersécurité

Restez informé: recevez régulièrement les nouveautés et évènements en matière de cybersécurité et sécurité informatique.
En renseignant votre adresse email, vous acceptez de recevoir nos derniers articles de blog par courrier électronique et vous prenez connaissance de notre Politique de Confidentialité. Vous pouvez vous désinscrire à tout moment.

Notre expertise cybersécurité validée par de multiples certifications internationales

certifications sécurité informatique AKAOMA