Description
A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources.
No analysis available yet.
Remediation
Vendor Solution
This issue has been resolved. No further action is needed.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31908 | A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources. |
References
| Link | Providers |
|---|---|
| https://www.sailpoint.com/security-advisories/ |
|
History
No history.
Subscriptions
No data.
Status: PUBLISHED
Assigner: SailPoint
Published:
Updated: 2024-08-01T20:05:08.329Z
Reserved: 2024-04-04T16:14:52.704Z
Link: CVE-2024-3318
Updated: 2024-08-01T20:05:08.329Z
Status : Deferred
Published: 2024-05-15T16:15:10.963
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-3318
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD