### [CVE-2024-52542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52542) ![](https://img.shields.io/static/v1?label=Product&message=AppSync&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.6.0.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&color=brightgreen) ### Description Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information tampering. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds