Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a high-privileged user account.
References
Link | Resource |
---|---|
https://github.com/datalust/seq-tickets/issues/1886 | Issue Tracking Vendor Advisory |
https://github.com/datalust/seq-tickets/issues/1886 | Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 08:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/datalust/seq-tickets/issues/1886 - Issue Tracking, Vendor Advisory |
01 Aug 2023, 13:46
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/datalust/seq-tickets/issues/1886 - Issue Tracking, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
First Time |
Datalust
Datalust seq |
|
CPE | cpe:2.3:a:datalust:seq:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other |
22 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-22 17:15
Updated : 2024-11-21 08:13
NVD link : CVE-2023-38195
Mitre link : CVE-2023-38195
CVE.ORG link : CVE-2023-38195
JSON object : View
Products Affected
datalust
- seq
CWE