Описание
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Ссылки
- Vendor Advisory
- Product
- MitigationThird Party Advisory
Уязвимые конфигурации
EPSS
7.2 High
CVSS3
6.5 Medium
CVSS3
Дефекты
Связанные уязвимости
Output Messenger before 2.0.63 was vulnerable to a directory traversal attack through improper file path handling. By using ../ sequences in parameters, attackers could access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.
Уязвимость инструмента обмена сообщениями и видеоконференций Output Messenger, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
7.2 High
CVSS3
6.5 Medium
CVSS3