In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be exploited by users with lower privilege roles.
References
Link | Resource |
---|---|
https://www.2n.com/en-GB/about-2n/cybersecurity/ | Product |
Configurations
History
06 Nov 2024, 22:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:* | |
First Time |
2n
2n access Commander |
|
References | () https://www.2n.com/en-GB/about-2n/cybersecurity/ - Product |
05 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) In 2N Access Commander versions 3.1.1.2 and prior, a Path Traversal vulnerability could allow an attacker with administrative privileges to write files on the filesystem and potentially achieve arbitrary remote code execution. This vulnerability cannot be exploited by users with lower privilege roles. |
05 Nov 2024, 10:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 10:20
Updated : 2024-11-06 22:23
NVD link : CVE-2024-47253
Mitre link : CVE-2024-47253
CVE.ORG link : CVE-2024-47253
JSON object : View
Products Affected
2n
- access_commander
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')