Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49498 | Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application. |
Fixes
Solution
The vulnerability has been fixed in the latest version.
Workaround
No workaround given by the vendor.
References
History
Tue, 24 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scriptcase
Scriptcase scriptcase |
|
| CPEs | cpe:2.3:a:scriptcase:scriptcase:9.4.019:*:*:*:*:*:*:* | |
| Vendors & Products |
Scriptcase
Scriptcase scriptcase |
|
| Metrics |
ssvc
|
Tue, 24 Sep 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application. | |
| Title | Path Traversal vulnerability on Scriptcase | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2024-09-24T13:27:40.219Z
Reserved: 2024-09-17T09:43:48.264Z
Link: CVE-2024-8941
Updated: 2024-09-24T13:27:35.218Z
Status : Analyzed
Published: 2024-09-25T01:15:48.287
Modified: 2024-09-30T19:45:43.223
Link: CVE-2024-8941
No data.
OpenCVE Enrichment
No data.
EUVD