28 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-36267",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-05-30T06:15:09.067",
"lastModified": "2024-05-30T13:15:41.297",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability exists in Redmine DMSF Plugin versions prior to 3.1.4. If this vulnerability is exploited, a logged-in user may obtain or delete arbitrary files on the server (within the privilege of the Redmine process)."
},
{
"lang": "es",
"value": "La vulnerabilidad de Path traversal existe en las versiones del complemento DMSF de Redmine anteriores a la 3.1.4. Si se explota esta vulnerabilidad, un usuario que haya iniciado sesi\u00f3n puede obtener o eliminar archivos arbitrarios en el servidor (dentro del privilegio del proceso Redmine)."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/danmunn/redmine_dmsf",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN22182715/",
"source": "vultures@jpcert.or.jp"
}
]
}