Directory Traversal vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the fileName parameter of the Save function.
References
Link | Resource |
---|---|
http://stimulsoft.com | Product |
https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R | Permissions Required |
https://cves.at/posts/cve-2024-24398/writeup/ | Exploit Third Party Advisory |
Configurations
History
13 Feb 2024, 16:06
Type | Values Removed | Values Added |
---|---|---|
First Time |
Stimulsoft dashboards.php
Stimulsoft |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () http://stimulsoft.com - Product | |
References | () https://cloud-trustit.spp.at/s/Pi78FFazHamJQ5R - Permissions Required | |
References | () https://cves.at/posts/cve-2024-24398/writeup/ - Exploit, Third Party Advisory | |
CWE | CWE-22 | |
CPE | cpe:2.3:a:stimulsoft:dashboards.php:*:*:*:*:*:*:*:* | |
Summary |
|
06 Feb 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-06 00:15
Updated : 2024-02-13 16:06
NVD link : CVE-2024-24398
Mitre link : CVE-2024-24398
CVE.ORG link : CVE-2024-24398
JSON object : View
Products Affected
stimulsoft
- dashboards.php
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')