A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31908 | A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources. |
Fixes
Solution
This issue has been resolved. No further action is needed.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.sailpoint.com/security-advisories/ |
|
History
No history.
Status: PUBLISHED
Assigner: SailPoint
Published:
Updated: 2024-08-01T20:05:08.329Z
Reserved: 2024-04-04T16:14:52.704Z
Link: CVE-2024-3318
Updated: 2024-08-01T20:05:08.329Z
Status : Awaiting Analysis
Published: 2024-05-15T16:15:10.963
Modified: 2024-11-21T09:29:23.120
Link: CVE-2024-3318
No data.
OpenCVE Enrichment
No data.
EUVD