ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://github.com/ThinkUpLLC/ThinkUp/issues/2289 | Exploit Issue Tracking Third Party Advisory |
https://github.com/ThinkUpLLC/ThinkUp/issues/2289 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ThinkUpLLC/ThinkUp/issues/2289 - Exploit, Issue Tracking, Third Party Advisory |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
Summary | ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
Information
Published : 2021-12-03 13:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43674
Mitre link : CVE-2021-43674
CVE.ORG link : CVE-2021-43674
JSON object : View
Products Affected
thinkupapp
- thinkup
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')