Description
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
References
http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html
ExploitThird Party AdvisoryVDB Entry
http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html
ExploitThird Party AdvisoryVDB Entry
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2023-08-17T17:15:12.143Z
2 years agoLast modified
2024-11-21T06:51:34.140Z
1 year ago