CVE-2013-0136

Mutiny < 5.0-1.10 - Path Traversal

Title source: rule

Description

Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/25517
metasploit WORKING POC
by juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb
metasploit WORKING POC EXCELLENT
by juan vazquez · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/mutiny_frontend_upload.rb

Scores

EPSS 0.7214
EPSS Percentile 98.8%

Details

CWE
CWE-22
Status published
Products (4)
mutiny/mutiny 5.0-1.00
mutiny/mutiny < 5.0-1.10
mutiny/mutiny_appliance
mutiny/mutiny_virtual_appliance
Published Jun 01, 2013
Tracked Since Feb 18, 2026