Update CVE-2023-37474.yaml
parent
57d5228626
commit
17d3db3a62
|
@ -2,7 +2,7 @@ id: CVE-2023-37474
|
|||
|
||||
info:
|
||||
name: Copyparty <= 1.8.2 - Directory Traversal
|
||||
author: theamanrawat
|
||||
author: shankar acharya,theamanrawat
|
||||
severity: high
|
||||
description: |
|
||||
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
|
@ -16,8 +16,11 @@ info:
|
|||
cve-id: CVE-2023-37474
|
||||
cwe-id: CWE-22
|
||||
metadata:
|
||||
verified: "true"
|
||||
tags: cve,cve2023,directory-traversal,copyparty,unauthenticated
|
||||
max-request: 1
|
||||
vendor: copyparty
|
||||
product: copyparty
|
||||
verified: true
|
||||
tags: cve,cve2023,traversal,copyparty
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
|
Loading…
Reference in New Issue