Description
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-20066 | A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:50:42.916Z
Reserved: 2021-05-20T00:00:00.000Z
Link: CVE-2021-33359
No data.
Status : Modified
Published: 2021-06-09T18:15:08.767
Modified: 2024-11-21T06:08:45.470
Link: CVE-2021-33359
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD