Update CVE-2023-37474.yaml
parent
57d5228626
commit
17d3db3a62
|
@ -2,7 +2,7 @@ id: CVE-2023-37474
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Copyparty <= 1.8.2 - Directory Traversal
|
name: Copyparty <= 1.8.2 - Directory Traversal
|
||||||
author: theamanrawat
|
author: shankar acharya,theamanrawat
|
||||||
severity: high
|
severity: high
|
||||||
description: |
|
description: |
|
||||||
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||||
|
@ -16,8 +16,11 @@ info:
|
||||||
cve-id: CVE-2023-37474
|
cve-id: CVE-2023-37474
|
||||||
cwe-id: CWE-22
|
cwe-id: CWE-22
|
||||||
metadata:
|
metadata:
|
||||||
verified: "true"
|
max-request: 1
|
||||||
tags: cve,cve2023,directory-traversal,copyparty,unauthenticated
|
vendor: copyparty
|
||||||
|
product: copyparty
|
||||||
|
verified: true
|
||||||
|
tags: cve,cve2023,traversal,copyparty
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
|
Loading…
Reference in New Issue