ID CVE-2020-27191
Summary LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Vulnerable Configurations
  • cpe:2.3:a:lionwiki:lionwiki:-:*:*:*:*:*:*:*
    cpe:2.3:a:lionwiki:lionwiki:-:*:*:*:*:*:*:*
  • cpe:2.3:a:lionwiki:lionwiki:3.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:lionwiki:lionwiki:3.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:lionwiki:lionwiki:3.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:lionwiki:lionwiki:3.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:lionwiki:lionwiki:3.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:lionwiki:lionwiki:3.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:lionwiki:lionwiki:3.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:lionwiki:lionwiki:3.2.11:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 30-11-2020 - 21:28)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc
Last major update 30-11-2020 - 21:28
Published 16-11-2020 - 16:15
Last modified 30-11-2020 - 21:28
Back to Top