Description
Directory traversal vulnerability in framework/source/resource/qx/test/part/delay.php in QooxDoo 1.3 and possibly other versions, as used in eyeOS 2.2 and 2.3, and possibly other products allows remote attackers to read arbitrary files via ..%2f (encoded dot dot) sequences in the file parameter.
Exploits (1)
References (10)
Core 10
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/66575
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/17127
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/71721
Exploit vdb-entry
x_refsource_osvdb
http://osvdb.org/71719
Exploit x_refsource_misc
http://www.autosectools.com/Advisories/eyeOS.2.3_Local.File.Inclusion_173.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/47184
Various Sources x_refsource_confirm
http://blog.eyeos.org/en/2011/04/07/about-some-eyeos-security-issues/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/66574
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43997
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43818
Scores
EPSS
0.0687
EPSS Percentile
91.4%
Details
CWE
CWE-22
Status
published
Products (1)
qooxdoo/qooxdoo
1.3
Published
Apr 18, 2011
Tracked Since
Feb 18, 2026