Directory traversal vulnerability in admin/remote.php in EGroupware Enterprise Line (EPL) before 11.1.20110804-1 and EGroupware Community Edition before 1.8.001.20110805 allows remote attackers to read arbitrary files via a ..%2f (encoded dot dot slash) in the type parameter.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T20:21:15.832Z
Reserved: 2011-12-23T00:00:00Z
Link: CVE-2011-4948

No data.

Status : Modified
Published: 2012-08-31T22:55:01.340
Modified: 2024-11-21T01:33:20.953
Link: CVE-2011-4948

No data.