Description
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
Remediation
References
https://blog.moku.fr/cves/CVE-2023-43256/
https://blog.moku.fr/cves/CVE-unassigned/
https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b
Related Vulnerabilities
CVE-2022-25644 Vulnerability in npm package @pendo324/get-process-by-name
CVE-2012-5783 Vulnerability in maven package commons-httpclient:commons-httpclient
CVE-2016-4800 Vulnerability in maven package org.eclipse.jetty:jetty-util
CVE-2023-27562 Vulnerability in npm package n8n
CVE-2019-0213 Vulnerability in maven package org.apache.archiva:archiva