tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/toocool/tripexpress/issues/40 | Exploit Third Party Advisory | 
| https://github.com/toocool/tripexpress/issues/40 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/toocool/tripexpress/issues/40 - Exploit, Third Party Advisory | 
01 Dec 2021, 16:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 7.5 v3 : 9.8 | 
| References | (MISC) https://github.com/toocool/tripexpress/issues/40 - Exploit, Third Party Advisory | |
| CWE | CWE-22 | |
| CPE | cpe:2.3:a:tripexpress_project:tripexpress:1.1:*:*:*:*:*:*:* | 
01 Dec 2021, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability. | 
29 Nov 2021, 16:19
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-11-29 16:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43691
Mitre link : CVE-2021-43691
CVE.ORG link : CVE-2021-43691
JSON object : View
Products Affected
                tripexpress_project
- tripexpress
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
