Логотип exploitDog
bind:CVE-2023-47313
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-47313

Количество 2

Количество 2

nvd логотип

CVE-2023-47313

около 2 лет назад

Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-93xx-m8fp-hhph

около 2 лет назад

Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-47313

Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
github логотип
GHSA-93xx-m8fp-hhph

Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal.

CVSS3: 5.4
0%
Низкий
около 2 лет назад

Уязвимостей на страницу