CVE-2018-19365

The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wowza:streaming_engine:4.7.4.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:57

Type Values Removed Values Added
References () https://blog.gdssecurity.com/labs/2019/2/11/wowza-streaming-engine-manager-directory-traversal-and-local.html - Exploit, Third Party Advisory () https://blog.gdssecurity.com/labs/2019/2/11/wowza-streaming-engine-manager-directory-traversal-and-local.html - Exploit, Third Party Advisory
References () https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2018-19365.txt - Third Party Advisory () https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2018-19365.txt - Third Party Advisory

Information

Published : 2019-03-21 16:00

Updated : 2024-11-21 03:57


NVD link : CVE-2018-19365

Mitre link : CVE-2018-19365

CVE.ORG link : CVE-2018-19365


JSON object : View

Products Affected

wowza

  • streaming_engine
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')