CVE-2018-1000882

Source
https://cve.org/CVERecord?id=CVE-2018-1000882
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000882.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000882
Published
2018-12-20T17:29:01.410Z
Modified
2026-04-11T17:14:27.198607Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.

References

Affected packages

Git / github.com/renlok/WeBid

Affected ranges

Type
GIT
Repo
https://github.com/renlok/WeBid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:webidsupport:webid:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.2.2"
        }
    ]
}

Affected versions

1.*
1.2
1.2.1
1.2.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000882.json"

Git / github.com/renlok/webid

Affected ranges

Type
GIT
Repo
https://github.com/renlok/webid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "source": "REFERENCES"
}

Affected versions

1.*
1.2
1.2.1
1.2.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000882.json"