Agentejo Cockpit performs actions on files without appropriate validation and therefore allows an attacker to traverse the file system to unintended locations and/or access arbitrary files, aka /media/api Directory Traversal.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Oct/30 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Oct/30 | Exploit Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Oct/30 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2018-10-15 19:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15540
Mitre link : CVE-2018-15540
CVE.ORG link : CVE-2018-15540
JSON object : View
Products Affected
agentejo
- cockpit
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')