Description
The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
Published: 2024-07-31
Score: 8.8 High
EPSS: 87.7% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r49h-6qxq-624f Weave server API vulnerable to arbitrary file leak
History

Mon, 25 Nov 2024 13:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Subscriptions

Weights \& Biases Weave
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-11-25T12:44:07.639Z

Reserved: 2024-07-31T14:34:53.114Z

Link: CVE-2024-7340

cve-icon Vulnrichment

Updated: 2024-07-31T16:07:44.136Z

cve-icon NVD

Status : Deferred

Published: 2024-07-31T15:15:11.203

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-7340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses