tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.
References
Link | Resource |
---|---|
https://github.com/toocool/tripexpress/issues/40 | Exploit Third Party Advisory |
https://github.com/toocool/tripexpress/issues/40 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/toocool/tripexpress/issues/40 - Exploit, Third Party Advisory |
Information
Published : 2021-11-29 16:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43691
Mitre link : CVE-2021-43691
CVE.ORG link : CVE-2021-43691
JSON object : View
Products Affected
tripexpress_project
- tripexpress
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')