Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
References
Link | Resource |
---|---|
http://stimulsoft.com | Product |
https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R | Permissions Required |
https://cves.at/posts/cve-2024-24398/writeup/ | Exploit Third Party Advisory |
http://stimulsoft.com | Product |
https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R | Permissions Required |
https://cves.at/posts/cve-2024-24398/writeup/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-06 00:15
Updated : 2024-11-21 08:59
NVD link : CVE-2024-24398
Mitre link : CVE-2024-24398
CVE.ORG link : CVE-2024-24398
JSON object : View
Products Affected
stimulsoft
- dashboards.php
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')