An unanchored /[a-z]{2}/ regular expression in ISPConfig before 3.1.13 makes it possible to include arbitrary files, leading to code execution. This is exploitable by authenticated users who have local filesystem access.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:01:14.833Z
Reserved: 2018-10-04T00:00:00
Link: CVE-2018-17984

No data.

Status : Modified
Published: 2018-10-04T23:29:00.570
Modified: 2024-11-21T03:55:19.780
Link: CVE-2018-17984

No data.