Description
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
Remediation
References
https://blog.moku.fr/cves/CVE-2023-43256/
https://blog.moku.fr/cves/CVE-unassigned/
https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b
Related Vulnerabilities
CVE-2020-14061 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2018-7408 Vulnerability in maven package org.webjars.npm:npm
CVE-2017-16207 Vulnerability in npm package discordi.js
CVE-2020-11023 Vulnerability in maven package org.webjars:jquery
CVE-2022-2900 Vulnerability in maven package org.webjars.npm:parse-url