CVE-2013-0136
Mutiny < 5.0-1.10 - Path Traversal
Title source: ruleDescription
Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/25517
metasploit
WORKING POC
by juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/mutiny_frontend_read_delete.rb
metasploit
WORKING POC
EXCELLENT
by juan vazquez · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/mutiny_frontend_upload.rb
Scores
EPSS
0.7214
EPSS Percentile
98.8%
Details
CWE
CWE-22
Status
published
Products (4)
mutiny/mutiny
5.0-1.00
mutiny/mutiny
< 5.0-1.10
mutiny/mutiny_appliance
mutiny/mutiny_virtual_appliance
Published
Jun 01, 2013
Tracked Since
Feb 18, 2026