Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52001 | An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://packetstorm.news/files/id/189017 |
|
Tue, 11 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 10 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in the relPath parameter of WebFileSys version 2.31.0 allows attackers to perform directory traversal via a crafted HTTP request. By injecting traversal payloads into the parameter, attackers can manipulate file paths and gain unauthorized access to sensitive files, potentially exposing data outside the intended directory. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-11T14:42:52.988Z
Reserved: 2024-11-20T00:00:00.000Z
Link: CVE-2024-53586
Updated: 2025-02-10T21:03:35.093Z
Status : Awaiting Analysis
Published: 2025-02-06T22:15:38.167
Modified: 2025-02-11T15:15:17.870
Link: CVE-2024-53586
No data.
OpenCVE Enrichment
No data.
EUVD