Skip to content
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
16 lines (8 sloc) 931 Bytes


Vendor: Center for Computational Research, University at Buffalo

Product: Open XDMoD

Affected versions: < 8.0

Open XDMoD is an open source tool to facilitate the management of high performance computing resources. It is widely deployed at academic, industrial, and government HPC centres. The web interface is written in PHP. The vulnerabilities discussed in this report have been discovered in version 7.5, and will be addressed in the upcoming 8.0 release.

Directory Traversal

This vulnerability relates to a directory traversal opportunity in "html/gui/general/dl_publication.php". Although an attacker can request a file download using a crafted "file" parameter argument, NULL byte injection is handled by recent versions of PHP which substantially reduces the impact. However, it is still possible to request arbitrary files ending in ".PDF".

See also CVE-2018-16988, CVE-2018-16960.

You can’t perform that action at this time.