Description
The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47533 | The application zips all the files in the folder specified by the user, which allows an attacker to read arbitrary files on the system by providing a crafted path. This vulnerability can be exploited by sending a request to the application with a malicious snapshot_path parameter. |
References
History
No history.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2024-08-01T21:41:03.297Z
Reserved: 2024-07-01T17:09:45.428Z
Link: CVE-2024-6433
Updated: 2024-08-01T21:41:03.297Z
Status : Deferred
Published: 2024-07-10T01:15:10.370
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6433
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:01:25Z
Weaknesses
EUVD