The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter.
References
Configurations
No configuration.
History
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/7d0463dd-6373-4eb8-86fc-beac0a1391a5 - |
12 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter. |
11 Jul 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-10 01:15
Updated : 2024-11-21 09:49
NVD link : CVE-2024-6433
Mitre link : CVE-2024-6433
CVE.ORG link : CVE-2024-6433
JSON object : View
Products Affected
No product.
CWE
CWE-23
Relative Path Traversal