A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25881
Reference (s):
- http://www.ranko.cn/index.html
- https://gitee.com/wuxi_ranko/cms
- https://github.com/AubreyJun/cms/issues/2

