Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
References
Configurations
No configuration.
History
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://clustercontrol.com - | |
References | () http://severalnines.com - | |
References | () https://docs.severalnines.com/docs/clustercontrol/changelogs/changes-in-v1-9-8/#maintenance-release-july-24th-2024 - | |
References | () https://docs.severalnines.com/docs/clustercontrol/changelogs/changes-in-v2-1-0/ - |
06 Aug 2024, 21:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Aug 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
29 Jul 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-26 21:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41628
Mitre link : CVE-2024-41628
CVE.ORG link : CVE-2024-41628
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')