cve/2023/CVE-2023-6577.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-06-09 00:33:16 +00:00
### [CVE-2023-6577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6577)
![](https://img.shields.io/static/v1?label=Product&message=PatrolFlow%202530Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2020231126%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Path%20Traversal&color=brighgreen)
### Description
A vulnerability was found in Byzoro PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### POC
#### Reference
- https://github.com/kpz-wm/cve/blob/main/Any_file_read.md
#### Github
No PoCs found on GitHub currently.