cve/2024/CVE-2024-7738.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-08-18 19:26:37 +00:00
### [CVE-2024-7738](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7738)
![](https://img.shields.io/static/v1?label=Product&message=vscode-markdown-pdf&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-21%20Pathname%20Traversal&color=brighgreen)
### Description
A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
### POC
#### Reference
- https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md
- https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4
#### Github
No PoCs found on GitHub currently.