cve/2023/CVE-2023-4171.md

18 lines
1019 B
Markdown
Raw Normal View History

2024-06-07 17:53:02 +00:00
### [CVE-2023-4171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4171)
![](https://img.shields.io/static/v1?label=Product&message=Flash%20Flood%20Disaster%20Monitoring%20and%20Warning%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-24%20Path%20Traversal%3A%20'..%2Ffiledir'&color=brighgreen)
### Description
A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file \Service\FileDownload.ashx. The manipulation of the argument Files leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-236206 is the identifier assigned to this vulnerability.
### POC
#### Reference
- https://github.com/nagenanhai/cve/blob/main/duqu.md
#### Github
No PoCs found on GitHub currently.