2024-05-20 14:03:31 +00:00

20 lines
694 B
JSON

{
"id": "CVE-2024-28064",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-18T22:15:07.343",
"lastModified": "2024-05-20T13:00:04.957",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Kiteworks Totemomail 7.x and 8.x before 8.3.0 allows /responsiveUI/EnvelopeOpenServlet messageId directory traversal for unauthenticated file read and delete operations (with displayLoginChunkedImages) and write operations (with storeLoginChunkedImages)."
}
],
"metrics": {},
"references": [
{
"url": "https://www.objectif-securite.ch/advisories/totemomail-path-traversal.txt",
"source": "cve@mitre.org"
}
]
}