Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
Weakness Type (CWE)
Vulnerable Products 4
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Roadiz Core-Bundle-Dev-App
cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:*
|
— |
2.3.42
|
|
Roadiz Core-Bundle-Dev-App
cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:*
|
2.4.0
|
2.5.44
|
|
Roadiz Core-Bundle-Dev-App
cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:*
|
2.6.0
|
2.6.28
|
|
Roadiz Core-Bundle-Dev-App
cpe:2.3:a:roadiz:core-bundle-dev-app:*:*:*:*:*:*:*:*
|
2.7.0
|
2.7.9
|