CVE-2023-46237
Summary
| CVE | CVE-2023-46237 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-31 15:15:00 UTC |
| Updated | 2023-11-08 17:41:00 UTC |
| Description | FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, an endpoint intended to offer limited enumeration abilities to authenticated users was accessible to unauthenticated users. This enabled unauthenticated users to discover files and their respective paths that were visible to the Apache user group. Version 1.5.10 contains a patch for this issue. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Fogproject | Fogproject | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Path traversal via unauthenticated endpoint. · Advisory · FOGProject/fogproject · GitHub | MISC | github.com | |
| Add authentication check in getfiles to prevent file enumeration, tha… · FOGProject/fogproject@68d7374 · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.