The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 25 Nov 2024 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-11-25T12:44:07.639Z

Reserved: 2024-07-31T14:34:53.114Z

Link: CVE-2024-7340

cve-icon Vulnrichment

Updated: 2024-07-31T16:07:44.136Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-31T15:15:11.203

Modified: 2024-11-25T13:15:08.107

Link: CVE-2024-7340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.