Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fmc4-f425-jjcv

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

EPSS

Процентиль: 92%
0.08221
Низкий

Связанные уязвимости

redhat
почти 21 год назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

nvd
почти 21 год назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.

debian
почти 21 год назад

The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x ...

EPSS

Процентиль: 92%
0.08221
Низкий