CVE-2018-1000882

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-1000882
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000882.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-1000882
Published
2018-12-20T17:29:01Z
Modified
2025-01-08T10:15:43.179124Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.

References

Affected packages

Git / github.com/renlok/webid

Affected ranges

Type
GIT
Repo
https://github.com/renlok/webid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.2
1.2.1
1.2.2