Path Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/48312 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/48312 | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 05:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/48312 - Exploit, Third Party Advisory, VDB Entry |
24 Aug 2021, 14:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webtareas_project:webtareas:2.0:-:*:*:*:*:*:* | |
References | (MISC) https://www.exploit-db.com/exploits/48312 - Exploit, Third Party Advisory, VDB Entry | |
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
18 Aug 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-18 17:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-23069
Mitre link : CVE-2020-23069
CVE.ORG link : CVE-2020-23069
JSON object : View
Products Affected
webtareas_project
- webtareas
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')