20 lines
742 B
JSON
Raw Normal View History

{
"id": "CVE-2023-33524",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-05T17:15:08.940",
"lastModified": "2023-06-05T17:15:08.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Advent/SSC Inc. Tamale RMS < 23.1 is vulnerable to Directory Traversal. The configuration backup file, which contains username hashes, cleartext passwords, and API keys, can be downloaded. This could allow a malicious actor to crack the passwords offline and/or utilize the API keys to control the remote application."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/barrett092/9ed092e4b14b9145f4d046556eb9dab7",
"source": "cve@mitre.org"
}
]
}