Agentejo Cockpit performs actions on files without appropriate validation and therefore allows an attacker to traverse the file system to unintended locations and/or access arbitrary files, aka /media/api Directory Traversal.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Oct/30 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2018-10-15 12:29
Updated : 2018-11-30 08:51
NVD link : CVE-2018-15540
Mitre link : CVE-2018-15540
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
agentejo
- cockpit