2023-08-17 20:00:36 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2023-26469",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2023-08-17T19:15:12.143",
|
2023-08-21 20:00:42 +00:00
|
|
|
"lastModified": "2023-08-21T19:15:08.140",
|
2023-08-18 14:00:35 +00:00
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2023-08-17 20:00:36 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
2023-08-21 20:00:42 +00:00
|
|
|
{
|
|
|
|
"url": "http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
2023-08-17 20:00:36 +00:00
|
|
|
{
|
|
|
|
"url": "https://github.com/Orange-Cyberdefense/CVE-repository/tree/master",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://jorani.org/security-features-in-lms.html",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|