Description
Directory traversal vulnerability in op/op.Login.php in LetoDMS (formerly MyDMS) 1.7.2 and earlier allows remote authenticated users to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by D. Fabian · textwebappsphp
https://www.exploit-db.com/exploits/33530
References (8)
Core 8
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38237
Various Sources x_refsource_misc
https://www.sec-consult.com/files/20100115-0_mydms_file_inclusion.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55709
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/42900
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37828
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/508947/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/61834
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2011/dsa-2146
Scores
EPSS
0.0697
EPSS Percentile
91.5%
Details
CWE
CWE-22
Status
published
Products (5)
letodms/letodms
1.5.0 (2 CPE variants)
letodms/letodms
1.5.1
letodms/letodms
1.6.0 b
letodms/letodms
1.7.0
letodms/letodms
< 1.7.2
Published
May 20, 2010
Tracked Since
Feb 18, 2026