Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Realone_player | Realnetworks | 1.0 (including) | 1.0 (including) |
Realone_player | Realnetworks | 2.0 (including) | 2.0 (including) |
Realplayer | Realnetworks | 10.0 (including) | 10.0 (including) |
Realplayer | Realnetworks | 10.0_6.0.12.690 (including) | 10.0_6.0.12.690 (including) |
Realplayer | Realnetworks | 10.0_beta (including) | 10.0_beta (including) |
Realplayer | Realnetworks | 10.5 (including) | 10.5 (including) |
Realplayer | Realnetworks | 10.5_6.0.12.1016_beta (including) | 10.5_6.0.12.1016_beta (including) |
Realplayer | Realnetworks | 10.5_6.0.12.1040 (including) | 10.5_6.0.12.1040 (including) |