Description
The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r49h-6qxq-624f | Weave server API vulnerable to arbitrary file leak |
References
History
Mon, 25 Nov 2024 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2024-11-25T12:44:07.639Z
Reserved: 2024-07-31T14:34:53.114Z
Link: CVE-2024-7340
Updated: 2024-07-31T16:07:44.136Z
Status : Deferred
Published: 2024-07-31T15:15:11.203
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-7340
No data.
OpenCVE Enrichment
No data.
Github GHSA