A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 22b0b443acca740fc83b5544165c1f53eff3f529. It is recommended to apply a patch to fix this issue.
History

Tue, 26 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Enms
Enms enms
CPEs cpe:2.3:a:enms:enms:*:*:*:*:*:*:*:*
Vendors & Products Enms
Enms enms
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 22b0b443acca740fc83b5544165c1f53eff3f529. It is recommended to apply a patch to fix this issue.
Title eNMS TGZ File controller.py multiselect_filtering path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-25T09:00:16.439Z

Updated: 2024-11-26T15:27:19.624Z

Reserved: 2024-11-24T16:29:54.449Z

Link: CVE-2024-11664

cve-icon Vulnrichment

Updated: 2024-11-26T15:25:55.758Z

cve-icon NVD

Status : Received

Published: 2024-11-25T09:15:06.800

Modified: 2024-11-25T09:15:06.800

Link: CVE-2024-11664

cve-icon Redhat

No data.