An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory.
References
Link | Resource |
---|---|
https://packetstorm.news/files/id/189017 |
Configurations
No configuration.
History
11 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
10 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
Summary |
|
|
CWE | CWE-22 |
06 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-06 22:15
Updated : 2025-02-11 15:15
NVD link : CVE-2024-53586
Mitre link : CVE-2024-53586
CVE.ORG link : CVE-2024-53586
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')