CVE-2023-0316:
Froxlor is vulnerable to path traversal
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.19424%
CWE
Published
1/16/2023
Updated
1/24/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
froxlor/froxlor | composer | < 2.0.0 | 2.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the file_put_contents call in SImExporter::import which used unsanitized user input from $_data to construct a file path. The original code extracted a filename from $_data without removing directory traversal sequences ('../'), enabling attackers to write files outside the intended directory. The patch explicitly adds str_replace('../', '', ...) to mitigate this, confirming the lack of path traversal sanitization was the root cause. The function's role in handling file imports and the direct use of untrusted input make it clearly vulnerable.