Логотип exploitDog
bind:CVE-2023-26441
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-26441

Количество 2

Количество 2

nvd логотип

CVE-2023-26441

больше 2 лет назад

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
EPSS: Низкий
github логотип

GHSA-xq7r-2vx2-8jgj

больше 2 лет назад

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-26441

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xq7r-2vx2-8jgj

Cacheservice did not correctly check if relative cache object were pointing to the defined absolute location when accessing resources. An attacker with access to the database and a local or restricted network would be able to read arbitrary local file system resources that are accessible by the services system user account. We have improved path validation and make sure that any access is contained to the defined root directory. No publicly available exploits are known.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу