We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Reserved 2025-07-28 | Published 2025-07-28 | Updated 2025-07-28 | Assigner KoreLogicCWE-24 Path Traversal: '../filedir'
CWE-434 Unrestricted Upload of File with Dangerous Type
CWE-648 Incorrect Use of Privileged APIs
This vulnerability was discovered by Jim Becher of KoreLogic, Inc.
korelogic.com/Resources/Advisories/KL-001-2025-016.txt
lpar2rrd.com/note800.php
Support options