Description
Booked Scheduler 2.7.7 contains a directory traversal vulnerability in the manage_email_templates.php script that allows authenticated administrators to access unauthorized files. Attackers can exploit the vulnerable 'tn' parameter to read files outside the intended directory by manipulating directory path traversal techniques.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Besim ALTINOK
References
www.exploit-db.com/exploits/48428 (ExploitDB-48428)
www.bookedscheduler.com (Booked Scheduler Official Website)
web.archive.org/...//sourceforge.net/projects/phpscheduleit/ (Archived Booked Scheduler SourceForge Page)
www.vulncheck.com/...duler-authenticated-directory-traversal (VulnCheck Advisory: Booked Scheduler 2.7.7 - Authenticated Directory Traversal)