Описание
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
Ссылки
- PatchRelease NotesThird Party Advisory
- Third Party Advisory
- PatchRelease NotesThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.3.6 (исключая)
cpe:2.3:a:sensepost:gowitness:*:*:*:*:*:*:*:*
EPSS
Процентиль: 81%
0.01517
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-552
Связанные уязвимости
github
больше 3 лет назад
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
EPSS
Процентиль: 81%
0.01517
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-552