Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Scriptcase
Scriptcase scriptcase |
|
CPEs | cpe:2.3:a:scriptcase:scriptcase:9.4.019:*:*:*:*:*:*:* | |
Vendors & Products |
Scriptcase
Scriptcase scriptcase |
|
Metrics |
ssvc
|
Tue, 24 Sep 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application. | |
Title | Path Traversal vulnerability on Scriptcase | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: INCIBE
Published: 2024-09-24T11:50:58.074Z
Updated: 2024-09-24T13:27:40.219Z
Reserved: 2024-09-17T09:43:48.264Z
Link: CVE-2024-8941
Vulnrichment
Updated: 2024-09-24T13:27:35.218Z
NVD
Status : Analyzed
Published: 2024-09-25T01:15:48.287
Modified: 2024-09-30T19:45:43.223
Link: CVE-2024-8941
Redhat
No data.