Description
Multiple directory traversal vulnerabilities in Elastic Path (EP) 4.1 and 4.1.1 allow remote attackers to (1) download arbitrary files via a .. (dot dot) in the file parameter to manager/getImportFileRedirect.jsp, (2) upload arbitrary files via a "..\" (dot dot backslash) in the file parameter to importData.jsp, and (3) list directory contents via a .. (dot dot) in the dir parameter to manager/fileManager.jsp.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Daniel Martin Gomez · textwebappsjsp
https://www.exploit-db.com/exploits/31445
exploitdb
WRITEUP
VERIFIED
by Daniel Martin Gomez · textwebappsjsp
https://www.exploit-db.com/exploits/31446
References (7)
Core 7
Core References
Various Sources x_refsource_confirm
http://developer.elasticpath.com/entry%21default.jspa?categoryID=4&externalID=1334
Various Sources x_refsource_misc
http://weblog.nomejortu.com/?p=37
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28352
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41356
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41364
Exploit x_refsource_misc
http://www.mwrinfosecurity.com/publications/mwri_elastic-path-arbitrary-file-system-access_2008-02-22.pdf
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29496
Scores
EPSS
0.0773
EPSS Percentile
92.0%
Details
CWE
CWE-22
Status
published
Products (2)
elastic_path/elastic_path
4.1
elastic_path/elastic_path
4.1.1
Published
Apr 01, 2008
Tracked Since
Feb 18, 2026