Directory Traversal vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via the file attachment directory setting.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.exploit-db.com/exploits/50113 | Exploit Third Party Advisory VDB Entry | 
| https://www.wyomind.com/magento2/helpdesk-magento-2.html | Product | 
| https://www.exploit-db.com/exploits/50113 | Exploit Third Party Advisory VDB Entry | 
| https://www.wyomind.com/magento2/helpdesk-magento-2.html | Product | 
Configurations
                    History
                    No history.
Information
                Published : 2023-03-08 22:15
Updated : 2025-03-04 22:15
NVD link : CVE-2021-33353
Mitre link : CVE-2021-33353
CVE.ORG link : CVE-2021-33353
JSON object : View
Products Affected
                wyomind
- help_desk
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
