Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rwww-93cx-4h2h

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In order to perform a directory traversal attack, all an attacker needs is a web browser and some knowledge on where to blindly find any default files and directories on the system. on the "Name" parameter the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.

In order to perform a directory traversal attack, all an attacker needs is a web browser and some knowledge on where to blindly find any default files and directories on the system. on the "Name" parameter the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.

EPSS

Процентиль: 48%
0.0025
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 5.4
nvd
больше 4 лет назад

Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.

EPSS

Процентиль: 48%
0.0025
Низкий

Дефекты

CWE-22