With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.
References
Link | Resource |
---|---|
https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418 | Patch Third Party Advisory |
https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/plankanban/planka/commit/ac1df5201dfdaf68d37f7e1b272bc137870d7418 | Patch Third Party Advisory |
https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-08-04 10:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2653
Mitre link : CVE-2022-2653
CVE.ORG link : CVE-2022-2653
JSON object : View
Products Affected
planka
- planka
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')