CVE-2024-40465

An issue in beego v.2.2.0 and before allows a remote attacker to escalate privileges via the getCacheFileName function in file.go file
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*

History

15 Aug 2024, 13:11

Type Values Removed Values Added
CPE cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*
First Time Beego
Beego beego
References () https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 - () https://gist.github.com/nyxfqq/a5a2fc5147a1b34538e1ac05a3e56910 - Third Party Advisory

02 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-327
CWE-328

01 Aug 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) Un problema en beego v.2.2.0 y anteriores permite a un atacante remoto escalar privilegios a través de la función getCacheFileName en el archivo file.go

31 Jul 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 21:15

Updated : 2024-08-15 13:11


NVD link : CVE-2024-40465

Mitre link : CVE-2024-40465

CVE.ORG link : CVE-2024-40465


JSON object : View

Products Affected

beego

  • beego
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm

CWE-328

Use of Weak Hash