Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-5142

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-24 Sep, 2023 | 22:00
Updated At-02 Aug, 2024 | 07:52
Rejected At-
Credits

H3C ER6300G2 Config File userLogin.asp path traversal

A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:24 Sep, 2023 | 22:00
Updated At:02 Aug, 2024 | 07:52
Rejected At:
▼CVE Numbering Authority (CNA)
H3C ER6300G2 Config File userLogin.asp path traversal

A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected Products
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-1100-P
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-1108-P
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-1200W
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-1800AX
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-2200
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-3200
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-5200
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
GR-8300
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER2100n
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER2200G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER3200G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER3260G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER5100G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER5200G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Vendor
New H3C Technologies Co., Ltd.H3C
Product
ER6300G2
Modules
  • Config File Handler
Versions
Affected
  • 20230908
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Path Traversal
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Path Traversal
Metrics
VersionBase scoreBase severityVector
3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.03.7LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
2.02.6N/A
AV:N/AC:H/Au:N/C:P/I:N/A:N
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.0
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 2.0
Base score: 2.6
Base severity: N/A
Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
yinsel975 (VulDB User)
Timeline
EventDate
Advisory disclosed2023-09-24 00:00:00
CVE reserved2023-09-24 00:00:00
VulDB entry created2023-09-24 02:00:00
VulDB entry last update2023-10-14 17:43:30
Event: Advisory disclosed
Date: 2023-09-24 00:00:00
Event: CVE reserved
Date: 2023-09-24 00:00:00
Event: VulDB entry created
Date: 2023-09-24 02:00:00
Event: VulDB entry last update
Date: 2023-10-14 17:43:30
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.240238
vdb-entry
technical-description
https://vuldb.com/?ctiid.240238
signature
permissions-required
https://github.com/yinsel/CVE-H3C-Report
broken-link
exploit
https://github.com/CJCniubi666/H3C-ER/blob/main/README.md
related
Hyperlink: https://vuldb.com/?id.240238
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/?ctiid.240238
Resource:
signature
permissions-required
Hyperlink: https://github.com/yinsel/CVE-H3C-Report
Resource:
broken-link
exploit
Hyperlink: https://github.com/CJCniubi666/H3C-ER/blob/main/README.md
Resource:
related
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.240238
vdb-entry
technical-description
x_transferred
https://vuldb.com/?ctiid.240238
signature
permissions-required
x_transferred
https://github.com/yinsel/CVE-H3C-Report
broken-link
exploit
x_transferred
https://github.com/CJCniubi666/H3C-ER/blob/main/README.md
related
x_transferred
Hyperlink: https://vuldb.com/?id.240238
Resource:
vdb-entry
technical-description
x_transferred
Hyperlink: https://vuldb.com/?ctiid.240238
Resource:
signature
permissions-required
x_transferred
Hyperlink: https://github.com/yinsel/CVE-H3C-Report
Resource:
broken-link
exploit
x_transferred
Hyperlink: https://github.com/CJCniubi666/H3C-ER/blob/main/README.md
Resource:
related
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:24 Sep, 2023 | 22:15
Updated At:17 May, 2024 | 02:32

A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Secondary3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Secondary2.02.6LOW
AV:N/AC:H/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 2.0
Base score: 2.6
Base severity: LOW
Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N
CPE Matches

New H3C Technologies Co., Ltd.
h3c
>>gr-1100-p_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-1100-p_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1100-p>>-
cpe:2.3:h:h3c:gr-1100-p:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1108-p_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-1108-p_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1108-p>>-
cpe:2.3:h:h3c:gr-1108-p:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1200w_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-1200w_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1200w>>-
cpe:2.3:h:h3c:gr-1200w:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1800ax_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-1800ax_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-1800ax>>-
cpe:2.3:h:h3c:gr-1800ax:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-2200_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-2200_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-2200>>-
cpe:2.3:h:h3c:gr-2200:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-3200_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-3200_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-3200>>-
cpe:2.3:h:h3c:gr-3200:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-5200_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-5200_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-5200>>-
cpe:2.3:h:h3c:gr-5200:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-8300_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:gr-8300_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>gr-8300>>-
cpe:2.3:h:h3c:gr-8300:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er3260g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er3260g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er3260g2>>-
cpe:2.3:h:h3c:er3260g2:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er5200g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er5200g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er5200g2>>-
cpe:2.3:h:h3c:er5200g2:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er3200g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er3200g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er3200g2>>-
cpe:2.3:h:h3c:er3200g2:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er2100n_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er2100n_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er2100n>>-
cpe:2.3:h:h3c:er2100n:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er6300g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er6300g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er6300g2>>-
cpe:2.3:h:h3c:er6300g2:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er5100g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er5100g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er5100g2>>-
cpe:2.3:h:h3c:er5100g2:-:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er2200g2_firmware>>Versions up to 20230908(inclusive)
cpe:2.3:o:h3c:er2200g2_firmware:*:*:*:*:*:*:*:*
New H3C Technologies Co., Ltd.
h3c
>>er2200g2>>-
cpe:2.3:h:h3c:er2200g2:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE-22Secondarycna@vuldb.com
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-22
Type: Secondary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/CJCniubi666/H3C-ER/blob/main/README.mdcna@vuldb.com
Exploit
Third Party Advisory
https://github.com/yinsel/CVE-H3C-Reportcna@vuldb.com
Exploit
Third Party Advisory
https://vuldb.com/?ctiid.240238cna@vuldb.com
Permissions Required
Third Party Advisory
https://vuldb.com/?id.240238cna@vuldb.com
Third Party Advisory
Hyperlink: https://github.com/CJCniubi666/H3C-ER/blob/main/README.md
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://github.com/yinsel/CVE-H3C-Report
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://vuldb.com/?ctiid.240238
Source: cna@vuldb.com
Resource:
Permissions Required
Third Party Advisory
Hyperlink: https://vuldb.com/?id.240238
Source: cna@vuldb.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

212Records found

CVE-2024-49760
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.05% / 15.27%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 21:35
Updated-06 Nov, 2024 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenRefine has a path traversal in LoadLanguageCommand

OpenRefine is a free, open source tool for working with messy data. The load-language command expects a `lang` parameter from which it constructs the path of the localization file to load, of the form `translations-$LANG.json`. But when doing so in versions prior to 3.8.3, it does not check that the resulting path is in the expected directory, which means that this command could be exploited to read other JSON files on the file system. Version 3.8.3 addresses this issue.

Action-Not Available
Vendor-openrefineOpenRefine
Product-openrefineOpenRefine
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-5018
Matching Score-4
Assigner-Progress Software Corporation
ShareView Details
Matching Score-4
Assigner-Progress Software Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 32.75%
||
7 Day CHG~0.00%
Published-25 Jun, 2024 | 20:27
Updated-21 Aug, 2024 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WhatsUp Gold LoadUsingBasePath Directory Traversal Information Disclosure Vulnerability

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Path Traversal vulnerability exists Wug.UI.Areas.Wug.Controllers.SessionController.LoadNMScript. This allows allows reading of any file from the applications web-root directory .

Action-Not Available
Vendor-Progress Software Corporation
Product-whatsup_goldWhatsUp Goldwhatsup_gold
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-3374
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-74.63% / 98.81%
||
7 Day CHG~0.00%
Published-02 Apr, 2021 | 18:13
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.

Action-Not Available
Vendor-rstudion/a
Product-shiny_servern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-47166
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-2.3||LOW
EPSS-0.21% / 44.06%
||
7 Day CHG~0.00%
Published-10 Oct, 2024 | 21:48
Updated-17 Oct, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
One-level read path traversal in `/custom_component` in Gradio

Gradio is an open-source Python package designed for quick prototyping. This vulnerability involves a **one-level read path traversal** in the `/custom_component` endpoint. Attackers can exploit this flaw to access and leak source code from custom Gradio components by manipulating the file path in the request. Although the traversal is limited to a single directory level, it could expose proprietary or sensitive code that developers intended to keep private. This impacts users who have developed custom Gradio components and are hosting them on publicly accessible servers. Users are advised to upgrade to `gradio>=4.44` to address this issue. As a workaround, developers can sanitize the file paths and ensure that components are not stored in publicly accessible directories.

Action-Not Available
Vendor-gradio_projectgradio-app
Product-gradiogradio
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-30483
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.19%
||
7 Day CHG~0.00%
Published-27 Jul, 2021 | 18:21
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository.

Action-Not Available
Vendor-isomorphic-gitn/a
Product-isomorphic-gitn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-29398
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-1.11% / 77.28%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 18:55
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal in /northstar/Common/NorthFileManager/fileManagerObjects.jsp Northstar Technologies Inc NorthStar Club Management 6.3 allows remote unauthenticated users to browse and list the directories across the entire filesystem of the host of the web application.

Action-Not Available
Vendor-globalnorthstarn/a
Product-northstar_club_managementn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-29134
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.41% / 60.60%
||
7 Day CHG~0.00%
Published-15 Mar, 2022 | 20:30
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.

Action-Not Available
Vendor-gitean/a
Product-gitean/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-45312
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.30% / 53.01%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 16:50
Updated-25 Sep, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary language parameter can passed to `aspell` executable via spelling requests in overleaf

Overleaf is a web-based collaborative LaTeX editor. Overleaf Community Edition and Server Pro prior to version 5.0.7 (or 4.2.7 for the 4.x series) contain a vulnerability that allows an arbitrary language parameter in client spelling requests to be passed to the `aspell` executable running on the server. This causes `aspell` to attempt to load a dictionary file with an arbitrary filename. File access is limited to the scope of the overleaf server. The problem is patched in versions 5.0.7 and 4.2.7. Previous versions can be upgraded using the Overleaf toolkit `bin/upgrade` command. Users unable to upgrade may block POST requests to `/spelling/check` via a Web Application Firewall will prevent access to the vulnerable spell check feature. However, upgrading is advised.

Action-Not Available
Vendor-overleafoverleafoverleaf
Product-overleafoverleafoverleaf
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-641
Improper Restriction of Names for Files and Other Resources
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2024-7080
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-1.20% / 78.06%
||
7 Day CHG~0.00%
Published-24 Jul, 2024 | 20:00
Updated-22 Apr, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Insurance Management System direct request

A vulnerability was found in SourceCodester Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /E-Insurance/. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272365 was assigned to this vulnerability.

Action-Not Available
Vendor-SourceCodestermunyweki
Product-insurance_management_systemInsurance Management Systeminsurance_management_system
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2020-9323
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-1.56% / 80.76%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 13:11
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aquaforest TIFF Server 4.0 allows Unauthenticated File and Directory Enumeration via tiffserver/tssp.aspx.

Action-Not Available
Vendor-aquaforestn/a
Product-tiff_servern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-36243
Matching Score-4
Assigner-Shop Beat Solutions (Pty) LTD
ShareView Details
Matching Score-4
Assigner-Shop Beat Solutions (Pty) LTD
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 48.88%
||
7 Day CHG~0.00%
Published-30 May, 2023 | 00:00
Updated-13 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directory Traversal on Shop Beat Services

Shop Beat Solutions (pty) LTD Shop Beat Media Player 2.5.95 up to 3.2.57 is vulnerable to Directory Traversal via server.shopbeat.co.za. Information Exposure Through Directory Listing vulnerability in "studio" software of Shop Beat. This issue affects: Shop Beat studio studio versions prior to 3.2.57 on arm.

Action-Not Available
Vendor-shopbeatShop Beat
Product-shop_beat_media_playerstudio
CWE ID-CWE-548
Exposure of Information Through Directory Listing
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-24942
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 26.46%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 09:21
Updated-01 Aug, 2024 | 23:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2023.11.3 path traversal allowed reading data within JAR archives

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCityteamcity
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found