mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
36 lines
1.2 KiB
JSON
36 lines
1.2 KiB
JSON
{
|
|
"id": "CVE-2023-34129",
|
|
"sourceIdentifier": "PSIRT@sonicwall.com",
|
|
"published": "2023-07-13T02:15:09.303",
|
|
"lastModified": "2023-07-13T08:32:09.673",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in SonicWall GMS and Analytics allows an authenticated remote attacker to traverse the directory and extract arbitrary files using Zip Slip method to any location on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.\n\n"
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"weaknesses": [
|
|
{
|
|
"source": "PSIRT@sonicwall.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010",
|
|
"source": "PSIRT@sonicwall.com"
|
|
},
|
|
{
|
|
"url": "https://www.sonicwall.com/support/notices/230710150218060",
|
|
"source": "PSIRT@sonicwall.com"
|
|
}
|
|
]
|
|
} |