An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory.
References
| Link | Resource |
|---|---|
| https://packetstorm.news/files/id/189017 |
Configurations
No configuration.
History
11 Feb 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
10 Feb 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
| Summary |
|
|
| CWE | CWE-22 |
06 Feb 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-06 22:15
Updated : 2025-02-11 15:15
NVD link : CVE-2024-53586
Mitre link : CVE-2024-53586
CVE.ORG link : CVE-2024-53586
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
