Description
Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-51440 | Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded. |
References
| Link | Providers |
|---|---|
| https://boltonshield.com/en/cve/cve-2023-47313/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T21:09:36.680Z
Reserved: 2023-11-06T00:00:00.000Z
Link: CVE-2023-47313
No data.
Status : Modified
Published: 2023-11-22T17:15:22.260
Modified: 2024-11-21T08:30:08.597
Link: CVE-2023-47313
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD