Логотип exploitDog
bind:CVE-2021-47899
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47899

Количество 2

Количество 2

nvd логотип

CVE-2021-47899

16 дней назад

YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.

CVSS3: 4
EPSS: Низкий
github логотип

GHSA-38wv-wfx6-3cx2

16 дней назад

YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.

CVSS3: 4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-47899

YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.

CVSS3: 4
0%
Низкий
16 дней назад
github логотип
GHSA-38wv-wfx6-3cx2

YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.

CVSS3: 4
0%
Низкий
16 дней назад

Уязвимостей на страницу