Headwind MDM Web panel 5.22.1 is vulnerable to Directory Traversal. The application uses an API call to move the uploaded temporary file to the file directory during the file upload process. This API call receives two input parameters, such as path and localPath. The first one refers to the temporary file with an absolute path without validating it. Attackers may modify this API call by referring to arbitrary files. As a result, arbitrary files can be moved to the files directory and so they can be downloaded.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://boltonshield.com/en/cve/cve-2023-47313/ |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2023-11-22T00:00:00
Updated: 2024-08-02T21:09:36.680Z
Reserved: 2023-11-06T00:00:00
Link: CVE-2023-47313
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-11-22T17:15:22.260
Modified: 2024-11-21T08:30:08.597
Link: CVE-2023-47313
Redhat
No data.