cve/2024/CVE-2024-52542.md
2025-09-29 21:09:30 +02:00

18 lines
741 B
Markdown

### [CVE-2024-52542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52542)
![](https://img.shields.io/static/v1?label=Product&message=AppSync&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.6.0.x%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&color=brightgreen)
### Description
Dell AppSync, version 4.6.0.x, contain a Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to information tampering.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds