cve/2024/CVE-2024-25154.md
2024-05-25 21:48:12 +02:00

18 lines
816 B
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-25154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25154)
![](https://img.shields.io/static/v1?label=Product&message=FileCatalyst&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.8.6%20%3C%203.8.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
Improper URL validation leads to path traversal in FileCatalyst Direct 3.8.8 and earlier allowing an encoded payload to cause the web server to return files located outside of the web root which may lead to data leakage.  
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds