A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/WhiteHSBG/JNDIExploit/issues/10 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.240866 | Third Party Advisory |
https://vuldb.com/?id.240866 | Third Party Advisory |
https://github.com/WhiteHSBG/JNDIExploit/issues/10 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.240866 | Third Party Advisory |
https://vuldb.com/?id.240866 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-09-29 11:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5257
Mitre link : CVE-2023-5257
CVE.ORG link : CVE-2023-5257
JSON object : View
Products Affected
microsoft
- windows
whitehsbg
- jndiexploit
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')