An attacker can include file contents from outside the `/adapter/xxx/` directory, where `xxx` is the name of an existent adapter like "admin". It is exploited using the administrative web panel with a request for an adapter file. **Note:** The attacker has to be logged in if the authentication is enabled (by default isn't enabled).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T22:32:01.573Z

Reserved: 2019-04-03T00:00:00

Link: CVE-2019-10767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-21T17:15:11.350

Modified: 2024-11-21T04:19:52.933

Link: CVE-2019-10767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.