Prasathmani

Tiny File Manager

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.28%
  • Veröffentlicht 15.09.2021 18:15:09
  • Zuletzt bearbeitet 31.12.2025 19:40:50

A Path Traversal vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload a file (with Admin credentials or with the CSRF vulnerability) with the "fullpath" parameter containing path traversal stri...

  • EPSS 0.13%
  • Veröffentlicht 15.09.2021 18:15:09
  • Zuletzt bearbeitet 31.12.2025 19:40:50

A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker.

  • EPSS 0.21%
  • Veröffentlicht 15.09.2021 18:15:09
  • Zuletzt bearbeitet 31.12.2025 19:40:50

A Stored XSS exists in TinyFileManager All version up to and including 2.4.6 in /tinyfilemanager.php when the server is given a file that contains HTML and javascript in its name. A malicious user can upload a file with a malicious filename containin...

  • EPSS 0.69%
  • Veröffentlicht 28.04.2020 22:15:12
  • Zuletzt bearbeitet 31.12.2025 19:40:50

In Tiny File Manager 2.4.1 there is a vulnerability in the ajax file backup copy functionality which allows authenticated users to create backup copies of files (with .bak extension) outside the scope in the same directory in which they are stored.

  • EPSS 1.13%
  • Veröffentlicht 28.04.2020 21:15:11
  • Zuletzt bearbeitet 31.12.2025 19:40:50

In Tiny File Manager 2.4.1, there is a Path Traversal vulnerability in the ajax recursive directory listing functionality. This allows authenticated users to enumerate directories and files on the filesystem (outside of the application scope).

  • EPSS 2.17%
  • Veröffentlicht 30.12.2019 20:15:12
  • Zuletzt bearbeitet 31.12.2025 19:40:50

In Tiny File Manager before 2.3.9, there is a remote code execution via Upload from URL and Edit/Rename files. Only authenticated users are impacted.