Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4c8h-4mm2-mm5g

Опубликовано: 10 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

EPSS

Процентиль: 94%
0.12201
Средний

4.4 Medium

CVSS3

Дефекты

CWE-125
CWE-22

Связанные уязвимости

CVSS3: 2.7
nvd
около 1 года назад

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

CVSS3: 4.4
fstec
больше 1 года назад

Уязвимость платформы для совместной работы Mitel MiCollab, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю читать произвольные файлы

EPSS

Процентиль: 94%
0.12201
Средний

4.4 Medium

CVSS3

Дефекты

CWE-125
CWE-22