Directory traversal vulnerability in system/admin/images.php in LoveCMS 1.6.2 Final allows remote attackers to delete arbitrary files via a .. (dot dot) in the delete parameter.
LoveCMS is prone to a vulnerability that allows attackers to delete arbitrary files because it fails to properly sanitize user-supplied input.An attacker can exploit this vulnerability to delete arbitrary files within the context of the webserver process.LoveCMS 1.6.2 is vulnerable; other versions may also be affected.
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: email@example.com.
Attackers can exploit this issue via a browser.The following proof-of-concept URI is available:http://www.example.com/[loveCMS-path]/system/admin/images.php?delete=../../../[local-file]