An attacker can include file contents from outside the `/adapter/xxx/` directory, where `xxx` is the name of an existent adapter like "admin". It is exploited using the administrative web panel with a request for an adapter file. **Note:** The attacker has to be logged in if the authentication is enabled (by default isn't enabled).
References
Link | Resource |
---|---|
https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881 | Exploit Third Party Advisory |
https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-11-21 17:15
Updated : 2024-11-21 04:19
NVD link : CVE-2019-10767
Mitre link : CVE-2019-10767
CVE.ORG link : CVE-2019-10767
JSON object : View
Products Affected
iobroker
- iobroker.js-controller
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')