Description
The vulnerability allows an attacker to access sensitive files on the server by confusing the agent with incorrect file names. When a user requests the content of a file with a misspelled name, the agent attempts to correct the command and inadvertently reveals the content of the intended file, such as /etc/passwd. This can lead to unauthorized access to sensitive information and potential server compromise.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46969 | The vulnerability allows an attacker to access sensitive files on the server by confusing the agent with incorrect file names. When a user requests the content of a file with a misspelled name, the agent attempts to correct the command and inadvertently reveals the content of the intended file, such as /etc/passwd. This can lead to unauthorized access to sensitive information and potential server compromise. |
References
History
Wed, 15 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 |
Wed, 15 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:49:44.102Z
Reserved: 2024-06-10T20:59:38.078Z
Link: CVE-2024-5821
Updated: 2024-08-01T21:25:02.649Z
Status : Awaiting Analysis
Published: 2024-07-03T18:15:05.857
Modified: 2025-10-15T13:15:47.970
Link: CVE-2024-5821
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:34Z
Weaknesses
EUVD