Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-49366

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-21 Oct, 2024 | 16:12
Updated At-21 Oct, 2024 | 16:42
Rejected At-
Credits

Nginx UI's json field can construct a directory traversal payload, causing arbitrary files to be written

Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:21 Oct, 2024 | 16:12
Updated At:21 Oct, 2024 | 16:42
Rejected At:
▼CVE Numbering Authority (CNA)
Nginx UI's json field can construct a directory traversal payload, causing arbitrary files to be written

Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.

Affected Products
Vendor
Nginx UI (0xJacky)0xJacky
Product
nginx-ui
Versions
Affected
  • < 2.0.0-beta.36
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
4.07.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jr
x_refsource_CONFIRM
https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36
x_refsource_MISC
Hyperlink: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jr
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Nginx UI (0xJacky)nginxui
Product
nginx_ui
CPEs
  • cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 2.0.0-beta.36 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:21 Oct, 2024 | 17:15
Updated At:07 Nov, 2024 | 15:15

Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CPE Matches

Nginx UI (0xJacky)
nginxui
>>nginx_ui>>Versions up to 1.9.9-4(inclusive)
cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta1:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta10:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta10_patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta11:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta12:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta13:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta13-patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta14:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta15:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta16:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta17:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta18:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta18-patch1:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta18-patch2:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta19:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta2:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta20:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta21:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta22:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta23:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta23-patch1:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta23-ptach2:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta24:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta25:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta25-patch1:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta25-ptach2:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta27:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta28:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta29:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta3:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta30:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta31:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta32:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta32-patch1:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta33:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta34:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta35:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4_patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5_patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch2:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta7:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8_patch:*:*:*:*:*:*
Nginx UI (0xJacky)
nginxui
>>nginx_ui>>2.0.0
cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta9:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarysecurity-advisories@github.com
CWE ID: CWE-22
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36security-advisories@github.com
Release Notes
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jrsecurity-advisories@github.com
Exploit
Vendor Advisory
Hyperlink: https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jr
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

121Records found

CVE-2019-20916
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.62% / 69.16%
||
7 Day CHG~0.00%
Published-04 Sep, 2020 | 19:20
Updated-05 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.

Action-Not Available
Vendor-pypan/aopenSUSEOracle CorporationDebian GNU/Linux
Product-debian_linuxcommunications_cloud_native_core_network_function_cloud_native_environmentpipcommunications_cloud_native_core_policyleapn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2011-5325
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.37% / 89.72%
||
7 Day CHG~0.00%
Published-07 Aug, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the BusyBox implementation of tar before 1.22.0 v5 allows remote attackers to point to files outside the current working directory via a symlink.

Action-Not Available
Vendor-busyboxn/aDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxbusyboxn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-23946
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.2||MEDIUM
EPSS-1.90% / 82.50%
||
7 Day CHG~0.00%
Published-14 Feb, 2023 | 19:48
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Git's `git apply` overwriting paths outside the working tree

Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.

Action-Not Available
Vendor-git-scmgit
Product-gitgit
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-33005
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.63%
||
7 Day CHG~0.00%
Published-13 May, 2022 | 15:18
Updated-16 Apr, 2025 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mySCADA myPRO Path Traversal

mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories.

Action-Not Available
Vendor-myscadamySCADA
Product-mypromyPRO
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-14206
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.68% / 81.42%
||
7 Day CHG~0.00%
Published-21 Jul, 2019 | 17:18
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Arbitrary File Deletion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to delete arbitrary files via the $REQUEST['adaptive-images-settings'] parameter in adaptive-images-script.php.

Action-Not Available
Vendor-nevman/a
Product-adaptive_imagesn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-13157
Matching Score-4
Assigner-Naver Corporation
ShareView Details
Matching Score-4
Assigner-Naver Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 61.67%
||
7 Day CHG~0.00%
Published-22 Nov, 2019 | 02:06
Updated-04 Aug, 2024 | 23:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.

Action-Not Available
Vendor-naverNAVER Corporation
Product-vaccineNaver Vaccine
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-13343
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.9||CRITICAL
EPSS-0.61% / 68.73%
||
7 Day CHG~0.00%
Published-02 Oct, 2019 | 15:49
Updated-04 Aug, 2024 | 23:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Butor Portal before 1.0.27 is affected by a Path Traversal vulnerability leading to a pre-authentication arbitrary file download. Effectively, a remote anonymous user can download any file on servers running Butor Portal. WhiteLabelingServlet is responsible for this vulnerability. It does not properly sanitize user input on the theme t parameter before reusing it in a path. This path is then used without validation to fetch a file and return its raw content to the user via the /wl?t=../../...&h= substring followed by a filename.

Action-Not Available
Vendor-butorn/a
Product-portaln/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2019-11601
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-1.12% / 77.33%
||
7 Day CHG~0.00%
Published-21 Aug, 2019 | 19:09
Updated-16 Sep, 2024 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal in the backup & restore functionality of ProSyst mBS SDK and Bosch IoT Gateway Software

A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.

Action-Not Available
Vendor-n/aRobert Bosch GmbH
Product-iot_gateway_softwareprosyst_mbs_sdkn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-8968
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.21%
||
7 Day CHG~0.00%
Published-24 Mar, 2018 | 18:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in zzcms 8.2. user/manage.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg or oldflv parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.

Action-Not Available
Vendor-zzcmsn/a
Product-zzcmsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-8965
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.81% / 73.33%
||
7 Day CHG~0.00%
Published-24 Mar, 2018 | 18:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in zzcms 8.2. user/ppsave.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.

Action-Not Available
Vendor-zzcmsn/a
Product-zzcmsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-8969
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.21%
||
7 Day CHG~0.00%
Published-24 Mar, 2018 | 18:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in zzcms 8.2. user/licence_save.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter in an action=modify request. This can be leveraged for database access by deleting install.lock.

Action-Not Available
Vendor-zzcmsn/a
Product-zzcmsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-9331
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.75% / 72.21%
||
7 Day CHG~0.00%
Published-07 Apr, 2018 | 02:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in zzcms 8.2. user/adv.php allows remote attackers to delete arbitrary files via directory traversal sequences in the oldimg parameter. This can be leveraged for database access by deleting install.lock.

Action-Not Available
Vendor-zzcmsn/a
Product-zzcmsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-10366
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.26%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 23:58
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LogicalDoc before 8.3.3 allows /servlet.gupld Directory Traversal, a different vulnerability than CVE-2020-9423 and CVE-2020-10365.

Action-Not Available
Vendor-logicaldocn/a
Product-logicaldocn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-42471
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-1.07% / 76.83%
||
7 Day CHG~0.00%
Published-02 Sep, 2024 | 16:13
Updated-27 Aug, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Write via artifact extraction in actions/artifact

actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue.

Action-Not Available
Vendor-actionsGitHub, Inc.
Product-actions\/artifactactions_toolkittoolkit
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-49381
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.27% / 50.48%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 13:06
Updated-14 Nov, 2024 | 23:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Plenti arbitrary file deletion vulnerability

Plenti, a static site generator, has an arbitrary file deletion vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write deletion when a plenti user serves their website. This issue may lead to information loss. Version 0.7.2 fixes the vulnerability.

Action-Not Available
Vendor-plentiplenticoplenti
Product-plentiplentiplentico
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-28966
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.33% / 54.83%
||
7 Day CHG~0.00%
Published-27 Jul, 2021 | 16:01
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir.

Action-Not Available
Vendor-n/aRubyMicrosoft Corporation
Product-windowsrubyn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-44825
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.35%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 00:00
Updated-26 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory Traversal vulnerability in Centro de Tecnologia da Informaco Renato Archer InVesalius3 v3.1.99995 allows attackers to write arbitrary files unto the system via a crafted .inv3 file.

Action-Not Available
Vendor-n/ainvesalius
Product-n/ainvesalius
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2021-1296
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.45% / 62.51%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:56
Updated-08 Nov, 2024 | 23:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers Arbitrary File Write Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv260w_wireless-ac_vpn_routerrv160_vpn_routerrv160w_wireless-ac_vpn_routerrv160_vpn_router_firmwarerv260p_vpn_router_with_poerv260w_wireless-ac_vpn_router_firmwarerv160w_wireless-ac_vpn_router_firmwarerv260_vpn_routerrv260_vpn_router_firmwarerv260p_vpn_router_with_poe_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-36
Absolute Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-7667
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.76%
||
7 Day CHG~0.00%
Published-24 Jun, 2020 | 12:00
Updated-17 Sep, 2024 | 02:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Write via Archive Extraction (Zip Slip)

In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.

Action-Not Available
Vendor-sasn/a
Product-go_rpm_utilsgithub.com/sassoftware/go-rpmutils/cpio
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-7377
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-8.1||HIGH
EPSS-0.41% / 60.49%
||
7 Day CHG~0.00%
Published-24 Aug, 2020 | 19:10
Updated-17 Sep, 2024 | 03:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rapid7 Metasploit Framework Relative Path Traversal in telpho10_credential_dump module

The Metasploit Framework module "auxiliary/admin/http/telpho10_credential_dump" module is affected by a relative path traversal vulnerability in the untar method which can be exploited to write arbitrary files to arbitrary locations on the host file system when the module is run on a malicious HTTP server.

Action-Not Available
Vendor-Rapid7 LLC
Product-metasploitMetasploit Framework
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-7668
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.5||HIGH
EPSS-0.35% / 56.50%
||
7 Day CHG~0.00%
Published-17 Jun, 2020 | 16:00
Updated-17 Sep, 2024 | 02:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary File Write via Archive Extraction (Zip Slip)

In all versions of the package github.com/unknwon/cae/tz, the ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.

Action-Not Available
Vendor-compression_and_archive_extensions_tz_projectn/a
Product-compression_and_archive_extensions_tz_projectgithub.com/unknwon/cae/tz
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found