Description
Directory traversal vulnerability in DeWeS web server 0.4.2 and possibly earlier, as used in Twilight CMS, allows remote attackers to read arbitrary files via a ..%5c (dot dot encoded backslash) in a GET request.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge · textwebappsphp
https://www.exploit-db.com/exploits/38737
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappswindows
https://www.exploit-db.com/exploits/27777
References (4)
Core 4
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/27777
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23167
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/54404
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-08/0126.html
Scores
EPSS
0.2217
EPSS Percentile
95.8%
Details
CWE
CWE-22
Status
published
Products (1)
twilightcms/twilight_cms
5.17 (2 CPE variants)
Published
Sep 09, 2013
Tracked Since
Feb 18, 2026