Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pf34-xxx2-xgxr

Опубликовано: 29 сент. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 3.5

Описание

A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.

A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.

EPSS

Процентиль: 9%
0.00032
Низкий

3.5 Low

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 3.5
nvd
больше 2 лет назад

A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.

CVSS3: 5.7
fstec
больше 2 лет назад

Уязвимость функции handleFileRequest (src/main/java/com/feihong/ldap/HTTPServer.java) инструмента для эксплуатации уязвимостей в Java Naming and Directory Interface (JNDI) JNDIExploit, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 9%
0.00032
Низкий

3.5 Low

CVSS3

Дефекты

CWE-22