With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.
References
Link | Resource |
---|---|
https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418 | Patch Third Party Advisory |
https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418 | Patch Third Party Advisory |
https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2022-08-04 10:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2653
Mitre link : CVE-2022-2653
CVE.ORG link : CVE-2022-2653
JSON object : View
Products Affected
planka
- planka
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')